CVE-2009-2727
Published Aug 10, 2009
Last updated 15 years ago
Overview
- Description
- Stack-based buffer overflow in the _tt_internal_realpath function in the ToolTalk library (libtt.a) in IBM AIX 5.2.0, 5.3.0, 5.3.7 through 5.3.10, and 6.1.0 through 6.1.3, when the rpc.ttdbserver daemon is enabled in /etc/inetd.conf, allows remote attackers to execute arbitrary code via a long XDR-encoded ASCII string to remote procedure 15.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17EECCCB-D7D1-439A-9985-8FAE8B44487B" }, { "criteria": "cpe:2.3:o:ibm:aix:5.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8A7DBFF-B11B-47EC-9E52-C12B156739D5" }, { "criteria": "cpe:2.3:o:ibm:aix:5.2.0.50:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B380F93D-5B13-49D0-B130-D45C2849A135" }, { "criteria": "cpe:2.3:o:ibm:aix:5.2.0.54:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11C8004D-639C-47BC-BE3E-CF5F06C1679C" }, { "criteria": "cpe:2.3:o:ibm:aix:5.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBD01F19-4B30-4147-AC48-7F5C64EE80CD" }, { "criteria": "cpe:2.3:o:ibm:aix:5.2_l:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "104E5C14-6D87-494B-8D60-0443ADDCD31A" }, { "criteria": "cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA8DDF4A-1C5D-4CB1-95B3-69EAE6572507" }, { "criteria": "cpe:2.3:o:ibm:aix:5.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6DE57C2-E728-4016-9774-28FB4B0509AB" }, { "criteria": "cpe:2.3:o:ibm:aix:5.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57B11497-5622-4759-906A-A93A3E815584" }, { "criteria": "cpe:2.3:o:ibm:aix:5.3.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F9CD013-D904-45DF-AD43-493A22D5744B" }, { "criteria": "cpe:2.3:o:ibm:aix:5.3.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "307B47F5-D903-4763-A353-2538AFD6C9CD" }, { "criteria": "cpe:2.3:o:ibm:aix:5.3.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A16950BB-11BC-4A40-BB3B-841807BB2546" }, { "criteria": "cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD518B94-9CD7-4C45-8766-578CF427B4CF" }, { "criteria": "cpe:2.3:o:ibm:aix:6.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF417123-CCB6-48AF-A21B-1974173D516B" }, { "criteria": "cpe:2.3:o:ibm:aix:6.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "362CFB2F-817A-4E55-A315-86B6243E3F74" }, { "criteria": "cpe:2.3:o:ibm:aix:6.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "53544921-1C1A-4382-99D7-0F3011BA76DB" } ], "operator": "OR" } ] } ]