Lucene search

K
cvelistIbmCVELIST:CVE-2017-1093
HistoryFeb 02, 2017 - 10:00 p.m.

CVE-2017-1093

2017-02-0222:00:00
ibm
www.cve.org
6

AI Score

7.6

Confidence

High

EPSS

0

Percentile

5.1%

IBM AIX 6.1, 7.1, and 7.2 could allow a local user to exploit a vulnerability in the bellmail binary to gain root privileges.

CNA Affected

[
  {
    "product": "AIX",
    "vendor": "IBM Corporation",
    "versions": [
      {
        "status": "affected",
        "version": "3.4"
      },
      {
        "status": "affected",
        "version": "3.2.0"
      },
      {
        "status": "affected",
        "version": "4.1.1"
      },
      {
        "status": "affected",
        "version": "4.1.2"
      },
      {
        "status": "affected",
        "version": "4.1.3"
      },
      {
        "status": "affected",
        "version": "4.1.4"
      },
      {
        "status": "affected",
        "version": "4.1.5"
      },
      {
        "status": "affected",
        "version": "4.2.0"
      },
      {
        "status": "affected",
        "version": "4.2.1.12"
      },
      {
        "status": "affected",
        "version": "430"
      },
      {
        "status": "affected",
        "version": "5"
      },
      {
        "status": "affected",
        "version": "5.1L"
      },
      {
        "status": "affected",
        "version": "5.2.2"
      },
      {
        "status": "affected",
        "version": "5.2 L"
      },
      {
        "status": "affected",
        "version": "5.3 L"
      },
      {
        "status": "affected",
        "version": "5.3.7"
      },
      {
        "status": "affected",
        "version": "4.3"
      },
      {
        "status": "affected",
        "version": "4.3.2"
      },
      {
        "status": "affected",
        "version": "4"
      },
      {
        "status": "affected",
        "version": "5.2"
      },
      {
        "status": "affected",
        "version": "4.3.1"
      },
      {
        "status": "affected",
        "version": "4.3.3.10"
      },
      {
        "status": "affected",
        "version": "3.1"
      },
      {
        "status": "affected",
        "version": "4.2.1"
      },
      {
        "status": "affected",
        "version": "4.2"
      },
      {
        "status": "affected",
        "version": "2.2.1"
      },
      {
        "status": "affected",
        "version": "5.1"
      },
      {
        "status": "affected",
        "version": "4.3.3"
      },
      {
        "status": "affected",
        "version": "4.1"
      },
      {
        "status": "affected",
        "version": "3.2.5"
      },
      {
        "status": "affected",
        "version": "3.2"
      },
      {
        "status": "affected",
        "version": "3.2.4"
      },
      {
        "status": "affected",
        "version": "6.1"
      },
      {
        "status": "affected",
        "version": "5.3"
      },
      {
        "status": "affected",
        "version": "5.2.0.50"
      },
      {
        "status": "affected",
        "version": "5.2.0.54"
      },
      {
        "status": "affected",
        "version": "5.3.0.10"
      },
      {
        "status": "affected",
        "version": "5.3.0.20"
      },
      {
        "status": "affected",
        "version": "5.2.0"
      },
      {
        "status": "affected",
        "version": "5.3.0"
      },
      {
        "status": "affected",
        "version": "5.3.8"
      },
      {
        "status": "affected",
        "version": "6.1.1"
      },
      {
        "status": "affected",
        "version": "6.1.2"
      },
      {
        "status": "affected",
        "version": "5.3.9"
      },
      {
        "status": "affected",
        "version": "6.1.0"
      },
      {
        "status": "affected",
        "version": "7.1"
      },
      {
        "status": "affected",
        "version": "1.2.1"
      },
      {
        "status": "affected",
        "version": "1.3"
      },
      {
        "status": "affected",
        "version": "4.0"
      },
      {
        "status": "affected",
        "version": "4.3.0"
      },
      {
        "status": "affected",
        "version": "5.1.0.10"
      },
      {
        "status": "affected",
        "version": "5.3_ml03"
      },
      {
        "status": "affected",
        "version": "5L"
      },
      {
        "status": "affected",
        "version": "7.2"
      }
    ]
  }
]

AI Score

7.6

Confidence

High

EPSS

0

Percentile

5.1%

Related for CVELIST:CVE-2017-1093