CVE-2010-1039

Description

Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and earlier; IBM VIOS 2.1, 1.5, and earlier; NFS/ONCplus B.11.31_09 and earlier on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote attackers to execute arbitrary code via an RPC request containing format string specifiers in an invalid directory name.

Category

10.0
CVSS
Severity: Critical
CVSS 2.0 •
EPSS 26.55% Top 5%
Vendor Advisory ibm.com Vendor Advisory ibm.com Vendor Advisory ibm.com Vendor Advisory ibm.com Vendor Advisory marc.info Vendor Advisory ibm.com Vendor Advisory ibm.com Vendor Advisory ibm.com Vendor Advisory ibm.com Vendor Advisory secunia.com Vendor Advisory vupen.com Vendor Advisory vupen.com Vendor Advisory vupen.com Vendor Advisory vupen.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://osvdb.org/64729 vdb entry
http://www.ibm.com/support/docview.wss?uid=isg1IZ75440 vendor advisory
http://secunia.com/advisories/39911 third party advisory
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=5088
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11986 signature vdb entry
http://www.securityfocus.com/bid/40248 patch vdb entry
http://www.securitytracker.com/id?1023994 vdb entry
http://www.ibm.com/support/docview.wss?uid=isg1IZ75369 vendor advisory
http://www.vupen.com/english/advisories/2010/1213 vdb entry vendor advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ73757 vendor advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ73599 vendor advisory
http://www.checkpoint.com/defense/advisories/public/2010/cpai-13-May.html
http://www.securityfocus.com/archive/1/511405/100/0/threaded mailing list
http://marc.info/?l=bugtraq&m=127428077629933&w=2 vendor advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12103 signature vdb entry
http://www.ibm.com/support/docview.wss?uid=isg1IZ75465 vendor advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ73874 vendor advisory
http://www.vupen.com/english/advisories/2010/1199 vdb entry vendor advisory
http://secunia.com/advisories/39835 third party advisory vendor advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/58718 vdb entry
http://securitytracker.com/id?1024016 vdb entry
http://www.vupen.com/english/advisories/2010/1212 vdb entry vendor advisory
http://www.vupen.com/english/advisories/2010/1211 vdb entry vendor advisory
http://aix.software.ibm.com/aix/efixes/security/pcnfsd_advisory.asc
http://www.ibm.com/support/docview.wss?uid=isg1IZ73590 vendor advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ73681 vendor advisory

Frequently Asked Questions

What is the severity of CVE-2010-1039?
CVE-2010-1039 has been scored as a critical severity vulnerability.
How to fix CVE-2010-1039?
To fix CVE-2010-1039, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2010-1039 being actively exploited in the wild?
It is possible that CVE-2010-1039 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~27% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.