Vulnerability Description
Stack-based buffer overflow in the _tt_internal_realpath function in the ToolTalk library (libtt.a) in IBM AIX 5.2.0, 5.3.0, 5.3.7 through 5.3.10, and 6.1.0 through 6.1.3, when the rpc.ttdbserver daemon is enabled in /etc/inetd.conf, allows remote attackers to execute arbitrary code via a long XDR-encoded ASCII string to remote procedure 15.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ibm | Aix | 5.2 |
Related Weaknesses (CWE)
References
- http://aix.software.ibm.com/aix/efixes/security/libtt_advisory.ascVendor Advisory
- http://risesecurity.org/advisories/RISE-2009001.txt
- http://secunia.com/advisories/35505Vendor Advisory
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52842Vendor Advisory
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52843Vendor Advisory
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52844Vendor Advisory
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52845Vendor Advisory
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52846Vendor Advisory
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52847Vendor Advisory
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52848Vendor Advisory
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52849Vendor Advisory
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52850Vendor Advisory
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52851Vendor Advisory
- http://www.securityfocus.com/bid/35419Exploit
- http://www.vupen.com/english/advisories/2009/1620PatchVendor Advisory
FAQ
What is CVE-2009-2727?
CVE-2009-2727 is a vulnerability with a CVSS score of 9.3 (HIGH). Stack-based buffer overflow in the _tt_internal_realpath function in the ToolTalk library (libtt.a) in IBM AIX 5.2.0, 5.3.0, 5.3.7 through 5.3.10, and 6.1.0 through 6.1.3, when the rpc.ttdbserver daem...
How severe is CVE-2009-2727?
CVE-2009-2727 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-2727?
Check the references section above for vendor advisories and patch information. Affected products include: Ibm Aix.