The secldapclntd daemon in AIX 4.3, 5.1 and 5.2 uses an Internet socket when communicating with the loadmodule, which allows remote attackers to directly connect to the daemon and conduct unauthorized activities.
References
Link | Resource |
---|---|
http://secunia.com/advisories/8221 | |
http://www-1.ibm.com/services/continuity/recover1.nsf/4699c03b46f2d4f68525678c006d45ae/85256a3400529a8685256cde0008ddde?OpenDocument | |
http://www.kb.cert.org/vuls/id/624713 | Patch Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/7264 | Patch Vendor Advisory |
http://secunia.com/advisories/8221 | |
http://www-1.ibm.com/services/continuity/recover1.nsf/4699c03b46f2d4f68525678c006d45ae/85256a3400529a8685256cde0008ddde?OpenDocument | |
http://www.kb.cert.org/vuls/id/624713 | Patch Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/7264 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/8221 - | |
References | () http://www-1.ibm.com/services/continuity/recover1.nsf/4699c03b46f2d4f68525678c006d45ae/85256a3400529a8685256cde0008ddde?OpenDocument - | |
References | () http://www.kb.cert.org/vuls/id/624713 - Patch, Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/bid/7264 - Patch, Vendor Advisory |
Information
Published : 2004-02-03 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2003-0119
Mitre link : CVE-2003-0119
CVE.ORG link : CVE-2003-0119
JSON object : View
Products Affected
ibm
- aix
CWE