IBM has issued a security bulletin warning of two vulnerabilities in its AIX operating system that could potentially lead to denial-of-service (DoS) attacks.
The affected kernel extensions—perfstat and TCP/IPmpresent risks to systems running on AIX 7.2, AIX 7.3, VIOS 3.1, and VIOS 4.1.
The vulnerabilities are tracked under CVE-2024-47102 and CVE-2024-52906, each with a Common Vulnerability Scoring System (CVSS) base score of 5.5.
CVE-2024-47102 and CVE-2024-52906 highlight critical vulnerabilities within the AIX operating system.
CVE-2024-47102, classified under CWE-20 (Improper Input Validation), is exploitable in the AIX perfstat kernel extension by a non-privileged local user, leading to denial of service through system crashes or process disruptions.
Similarly, CVE-2024-52906, identified in the AIX TCP/IP kernel extension, arises from a race condition (CWE-362), enabling local users to exploit the flaw and trigger DoS scenarios. Both vulnerabilities pose significant risks to system stability and security.
Here is the information in a table format:
Product | Affected Version | Key Affected Fileset | Impacted Version Range |
---|---|---|---|
AIX 7.2 | AIX 7.2.5.0 – AIX 7.3.2.1 | bos.net.tcp.client_core | AIX 7.2.5.0 – AIX 7.3.2.1 |
AIX 7.3 | AIX 7.2.5.0 – AIX 7.3.2.0 | bos.perf.perfstat | AIX 7.2.5.0 – AIX 7.3.2.0 |
VIOS 3.1 | AIX 7.2.5.0 – AIX 7.3.2.1 | bos.net.tcp.client_core | AIX 7.2.5.0 – AIX 7.3.2.1 |
VIOS 4.1 | AIX 7.2.5.0 – AIX 7.3.2.0 | bos.perf.perfstat | AIX 7.2.5.0 – AIX 7.3.2.0 |
IBM strongly recommends applying the necessary fixes to mitigate these vulnerabilities. Fixes are available for affected AIX and VIOS versions.
A reboot is generally required after installation, but administrators can use Live Update in AIX 7.2 and 7.3 to avoid downtime.
IJ52366s6a.241113.epkg.Z
(TCP/IP kernel extensions)IJ52533m8a.241204.epkg.Z
(perfstat kernel extensions) Ensure the integrity of downloaded files using SHA-256 checksums.Installing Fix Packages: Preview or install fixes using these commands:
installp -a -d fix_name -p all
installp -a -d fix_name -X all
For interim fixes:emgr -e ipkg_name -p
emgr -e ipkg_name -X
IBM advises creating a mksysb backup of the system prior to any updates. Ensure it is bootable and readable to avoid risks during updates. No workarounds or mitigations are available for these vulnerabilities, making immediate action crucial.
IBM encourages administrators to subscribe to My Notifications to receive updates on future security bulletins:My Notifications.
These vulnerabilities highlight the importance of keeping operating systems up-to-date with the latest security patches.
By addressing CVE-2024-47102 and CVE-2024-52906, organizations can safeguard their AIX systems against potential denial-of-service attacks.
2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide
Hackers have reportedly infiltrated and extracted a vast 82 GB of sensitive data from the Indonesian…
The Apache Software Foundation has issued a security alert regarding a critical vulnerability in Apache…
The Chinese National Internet Emergency Center (CNIE) has revealed two significant cases of cyber espionage…
A critical command injection vulnerability in the popular systeminformation npm package has recently been disclosed, exposing millions…
Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer through…
An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the initial…