{"vuid":"VU#123651","idnumber":"123651","name":"IBM AIX lsfs utility invokes grep and lslv with relative pathnames","keywords":["IBM","AIX","lsfs","grep","lslv","APAR: IY16909"],"overview":"The IBM AIX operating system contains a vulnerability in the lsfs utility that allows a local user to execute arbitrary code as root.","clean_desc":"The IBM AIX lsfs utility displays filesystem information such as mount points, permissions and volume sizes. To list this information, it executes lslv to list logical volumes and grep  to parse the resulting output. Because lsfs uses relative pathnames when executing grep and lslv, a local attacker can use the PATH environment variable to redirect the calls made by lsfs to a local version of either grep or lslv. If setuid root permissions have been applied to lsfs, the local versions of grep and lslv will be executed with root privileges.","impact":"This vulnerability allows local users to execute arbitrary code as root.","resolution":"Apply a patch from your vendor IBM has released APAR IY16909 to address this issue. For further information, please consult the \"Systems Affected\" section of this document.","workarounds":"Clear setuid bit on lsfs Previous to AIX 5.1 and some versions of AIX 4.3.3, default installations of AIX contained an lsfs binary with the setuid bit enabled. To reduce the impact of this vulnerability on those versions, use the chmod command to clear the setuid bit.","sysaffected":"","thanks":"","author":"This document was written by Jeffrey P. Lanza and is based on information provided by IBM.","public":["http://archives.neohapsis.com/archives/aix/2001-q2/0000.html","http://as400bks.rochester.ibm.com/doc_link/en_US/a_doc_lib/cmds/aixcmds3/lsfs.htm","http://as400bks.rochester.ibm.com/doc_link/en_US/a_doc_lib/cmds/aixcmds3/lslv.htm"],"cveids":["CVE-2001-0573"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-05-15T20:27:22Z","publicdate":"2001-04-03T07:18:25Z","datefirstpublished":"2001-09-05T14:11:01Z","dateupdated":"2001-09-05T14:21:29Z","revision":16,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"10","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"19","cam_easeofexploitation":"20","cam_attackeraccessrequired":"10","cam_scorecurrent":"21.375","cam_scorecurrentwidelyknown":"24.9375","cam_scorecurrentwidelyknownexploited":"32.0625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":21.375,"vulnote":null}