{ "schema_version": "1.4.0", "id": "GHSA-rj97-7gg7-c89r", "modified": "2025-04-12T12:35:16Z", "published": "2022-05-13T01:06:58Z", "aliases": [ "CVE-2014-3074" ], "details": "The runtime linker in IBM AIX 6.1 and 7.1 and VIOS 2.2.x allows local users to create a mode-666 root-owned file, and consequently gain privileges, by setting crafted MALLOCOPTIONS and MALLOCBUCKETS environment-variable values and then executing a setuid program.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3074" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93816" }, { "type": "WEB", "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-3074" }, { "type": "WEB", "url": "http://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/127390/IBM-AIX-Runtime-Linker-Privilege-Escalation.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2014/Jul/31" }, { "type": "WEB", "url": "http://secunia.com/advisories/59344" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV60935" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV60940" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV61311" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV61313" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV61314" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV61315" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/532689/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/68296" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1030504" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-07-02T10:35:00Z" } }