Multiple vulnerabilities in IBM AIX

Published: 2017-11-09 13:30:08
Severity Low
Patch available YES
Number of vulnerabilities 88
CVSSv2 3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
5.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
CVSSv3 4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
6.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
6.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
6.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
6.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
8.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE ID CVE-2017-12993
CVE-2017-12992
CVE-2017-12991
CVE-2017-12988
CVE-2017-12987
CVE-2017-12986
CVE-2017-12985
CVE-2017-12902
CVE-2017-12901
CVE-2017-12900
CVE-2017-12899
CVE-2017-12898
CVE-2017-12897
CVE-2017-12896
CVE-2017-12895
CVE-2017-12894
CVE-2017-12893
CVE-2017-11542
CVE-2017-11541
CVE-2017-12997
CVE-2017-12995
CVE-2017-12990
CVE-2017-12989
CVE-2017-13011
CVE-2017-11543
CVE-2017-13018
CVE-2017-13017
CVE-2017-13016
CVE-2017-13015
CVE-2017-13014
CVE-2017-13013
CVE-2017-13012
CVE-2017-13010
CVE-2017-13009
CVE-2017-13008
CVE-2017-13006
CVE-2017-13005
CVE-2017-13004
CVE-2017-13003
CVE-2017-13002
CVE-2017-13001
CVE-2017-13000
CVE-2017-12999
CVE-2017-12998
CVE-2017-12996
CVE-2017-12994
CVE-2017-13043
CVE-2017-13042
CVE-2017-13041
CVE-2017-13040
CVE-2017-13039
CVE-2017-13038
CVE-2017-13037
CVE-2017-13036
CVE-2017-13035
CVE-2017-13034
CVE-2017-13033
CVE-2017-13032
CVE-2017-13031
CVE-2017-13030
CVE-2017-13029
CVE-2017-13028
CVE-2017-13027
CVE-2017-13026
CVE-2017-13025
CVE-2017-13024
CVE-2017-13023
CVE-2017-13022
CVE-2017-13021
CVE-2017-13020
CVE-2017-13019
CVE-2017-13725
CVE-2017-13690
CVE-2017-13689
CVE-2017-13688
CVE-2017-13687
CVE-2017-13055
CVE-2017-13054
CVE-2017-13053
CVE-2017-13052
CVE-2017-13051
CVE-2017-13050
CVE-2017-13049
CVE-2017-13048
CVE-2017-13047
CVE-2017-13046
CVE-2017-13045
CVE-2017-13044
CWE ID CWE-126
CWE-835
CWE-120
Exploitation vector Network
Public exploit Not available
Vulnerable software IBM AIX
Vulnerable software versions IBM AIX 7.2
IBM AIX 7.1
IBM AIX 6.1
IBM AIX 5.3
Vendor URL IBM Corporation
Advisory type Public

Security Advisory

1) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the Juniper component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

2) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the RIPng component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

3) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the BGP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

4) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the telnet component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

5) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the IEEE 802.11 component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

6) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the IPv6 routing headers component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

7) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the IPv6 component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

8) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the Zephyr component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

9) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the EIGRP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

10) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the tok2strbuf component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

11) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the DECnet component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

12) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the NFS component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

13) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the ISO CLNS component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

14) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the ISAKMP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

15) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the ICMP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

16) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the lookup_bytestring component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

17) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the SMB/CIFS component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

18) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the PIMv1 component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

19) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the safeputs component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

20) Infinite loop

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to infinite loop in the LLDP component. A remote attacker can send specially crafted data and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

21) Infinite loop

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to infinite loop in the DNS component. A remote attacker can send specially crafted data and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

22) Infinite loop

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to infinite loop in the ISAKMP component. A remote attacker can send specially crafted data and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

23) Infinite loop

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to infinite loop in the RESP component. A remote attacker can send specially crafted data and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

24) Buffer overflow

Description

The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.

The weakness exists due to boundary error in the the bittok2str_internal component. A remote attacker can send an overly long string argument, trigger buffer overflow and cause the application to crash or possibly execute arbitrary code.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

25) Buffer overflow

Description

The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.

The weakness exists due to boundary error in the sliplink_print function in print-sl.c. A remote attacker can send specially crafted data, trigger buffer overflow and cause the application to crash or execute arbitrary code.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

26) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the PGM component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

27) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the DHCPv6 component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

28) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the ISO ES-IS component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

29) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the EAP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

30) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the White Board component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

31) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the ARP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

32) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the ICMP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

33) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the BEEP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

34) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the IPv6 mobility component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

35) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the IEEE 802.11 component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

36) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the L2TP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

37) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the NFS component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

38) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the Juniper component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

39) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the LMP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

40) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the AODV component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

41) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the NFS component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

42) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the IEEE 802.15.4 component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

43) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the ISO IS-IS component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

44) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the ISO IS-IS component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

45) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the PIMv2 component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

46) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the BGP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

47) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the BGP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

48) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the HNCP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

49) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the ICMPv6 component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

50) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the MPTCP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

51) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the ISAKMP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

52) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the PPP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

53) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the IP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

54) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the OSPFv3 component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

55) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the ISO IS-IS component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

56) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the PGM component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

57) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the VTP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

58) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the RADIUS component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

59) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the IPv6 fragmentation header component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

60) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the PIM component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

61) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the PPP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

62) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the BOOTP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

63) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the LLDP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

64) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the ISO IS-IS component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

65) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the IPv6 mobility component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

66) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the IPv6 mobility component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

67) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the IPv6 mobility component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

68) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the IP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

69) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the ICMPv6 component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

70) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the VTP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

71) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the PGM component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

72) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the IPv6 routing headers component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

73) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the IKEv2 component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

74) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the IKEv1 component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

75) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the OLSR component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

76) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the Cisco HDLC component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

77) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the ISO IS-IS component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

78) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the LLDP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

79) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the BGP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

80) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the CFM component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

81) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the RSVP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

82) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the RPKI-Router component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

83) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the Rx component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

84) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the RSVP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

85) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the ISO ES-IS component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

86) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the BGP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

87) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the VQP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

88) Buffer over-read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to buffer over-read in the HNCP component. A remote attacker can send a specially crafted request and retrieve arbitrary files on the system.

Remediation

Install update from vendor's website.

External links

http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc

Back to List