← Back to CVEs
CVE-2009-2727
N/ADescription
Stack-based buffer overflow in the _tt_internal_realpath function in the ToolTalk library (libtt.a) in IBM AIX 5.2.0, 5.3.0, 5.3.7 through 5.3.10, and 6.1.0 through 6.1.3, when the rpc.ttdbserver daemon is enabled in /etc/inetd.conf, allows remote attackers to execute arbitrary code via a long XDR-encoded ASCII string to remote procedure 15.
CVE Details
CVSS v3.1 ScoreN/A
Published8/10/2009
Last Modified4/23/2026
Sourcenvd
Honeypot Sightings0
Affected Products
ibm:aix
Weaknesses (CWE)
CWE-119
References
http://risesecurity.org/advisories/RISE-2009001.txt(cve@mitre.org)
http://secunia.com/advisories/35505(cve@mitre.org)
http://www.ibm.com/support/docview.wss?uid=isg1IZ52842(cve@mitre.org)
http://www.ibm.com/support/docview.wss?uid=isg1IZ52843(cve@mitre.org)
http://www.ibm.com/support/docview.wss?uid=isg1IZ52844(cve@mitre.org)
http://www.ibm.com/support/docview.wss?uid=isg1IZ52845(cve@mitre.org)
http://www.ibm.com/support/docview.wss?uid=isg1IZ52846(cve@mitre.org)
http://www.ibm.com/support/docview.wss?uid=isg1IZ52847(cve@mitre.org)
http://www.ibm.com/support/docview.wss?uid=isg1IZ52848(cve@mitre.org)
http://www.ibm.com/support/docview.wss?uid=isg1IZ52849(cve@mitre.org)
http://www.ibm.com/support/docview.wss?uid=isg1IZ52850(cve@mitre.org)
http://www.ibm.com/support/docview.wss?uid=isg1IZ52851(cve@mitre.org)
http://www.securityfocus.com/bid/35419(cve@mitre.org)
http://www.vupen.com/english/advisories/2009/1620(cve@mitre.org)
http://aix.software.ibm.com/aix/efixes/security/libtt_advisory.asc(af854a3a-2127-422b-91ae-364da2661108)
http://risesecurity.org/advisories/RISE-2009001.txt(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/35505(af854a3a-2127-422b-91ae-364da2661108)
http://www.ibm.com/support/docview.wss?uid=isg1IZ52842(af854a3a-2127-422b-91ae-364da2661108)
http://www.ibm.com/support/docview.wss?uid=isg1IZ52843(af854a3a-2127-422b-91ae-364da2661108)
http://www.ibm.com/support/docview.wss?uid=isg1IZ52844(af854a3a-2127-422b-91ae-364da2661108)
http://www.ibm.com/support/docview.wss?uid=isg1IZ52845(af854a3a-2127-422b-91ae-364da2661108)
http://www.ibm.com/support/docview.wss?uid=isg1IZ52846(af854a3a-2127-422b-91ae-364da2661108)
http://www.ibm.com/support/docview.wss?uid=isg1IZ52847(af854a3a-2127-422b-91ae-364da2661108)
http://www.ibm.com/support/docview.wss?uid=isg1IZ52848(af854a3a-2127-422b-91ae-364da2661108)
http://www.ibm.com/support/docview.wss?uid=isg1IZ52849(af854a3a-2127-422b-91ae-364da2661108)
http://www.ibm.com/support/docview.wss?uid=isg1IZ52850(af854a3a-2127-422b-91ae-364da2661108)
http://www.ibm.com/support/docview.wss?uid=isg1IZ52851(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/35419(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2009/1620(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.