IBM AIX 5.1L is prone to an issue that may allow a remote attacker to obtain unauthorized access to a vulnerable system. The vulnerability exists when AIX 5.1L is configured to use loadable authentication modules. This behaviour does not occur when a local password file, or NIS, are used. The precise technical details regarding this issue are not currently known. This BID will be updated as more information becomes available.
IBM AIX 5.1L is prone to an issue that may allow a remote attacker to obtain unauthorized access to a vulnerable system. The vulnerability exists when AIX 5.1L is configured to use loadable authentication modules. This behaviour does not occur when a local password file, or NIS, are used. The precise technical details regarding this issue are not currently known. This BID will be updated as more information becomes available.