CVE-2009-2727
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
10/08/2009
Last modified:
09/04/2025
Description
Stack-based buffer overflow in the _tt_internal_realpath function in the ToolTalk library (libtt.a) in IBM AIX 5.2.0, 5.3.0, 5.3.7 through 5.3.10, and 6.1.0 through 6.1.3, when the rpc.ttdbserver daemon is enabled in /etc/inetd.conf, allows remote attackers to execute arbitrary code via a long XDR-encoded ASCII string to remote procedure 15.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:ibm:aix:5.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:ibm:aix:5.2.0.50:*:*:*:*:*:*:* | ||
| cpe:2.3:o:ibm:aix:5.2.0.54:*:*:*:*:*:*:* | ||
| cpe:2.3:o:ibm:aix:5.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:ibm:aix:5.2_l:*:*:*:*:*:*:* | ||
| cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:ibm:aix:5.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:ibm:aix:5.3.7:*:*:*:*:*:*:* | ||
| cpe:2.3:o:ibm:aix:5.3.8:*:*:*:*:*:*:* | ||
| cpe:2.3:o:ibm:aix:5.3.9:*:*:*:*:*:*:* | ||
| cpe:2.3:o:ibm:aix:5.3.10:*:*:*:*:*:*:* | ||
| cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:ibm:aix:6.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:ibm:aix:6.1.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://aix.software.ibm.com/aix/efixes/security/libtt_advisory.asc
- http://risesecurity.org/advisories/RISE-2009001.txt
- http://secunia.com/advisories/35505
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52842
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52843
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52844
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52845
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52846
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52847
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52848
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52849
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52850
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52851
- http://www.securityfocus.com/bid/35419
- http://www.vupen.com/english/advisories/2009/1620
- http://aix.software.ibm.com/aix/efixes/security/libtt_advisory.asc
- http://risesecurity.org/advisories/RISE-2009001.txt
- http://secunia.com/advisories/35505
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52842
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52843
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52844
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52845
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52846
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52847
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52848
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52849
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52850
- http://www.ibm.com/support/docview.wss?uid=isg1IZ52851
- http://www.securityfocus.com/bid/35419
- http://www.vupen.com/english/advisories/2009/1620



