Описание
IBM Sterling Connect:Direct for UNIX 4.2.0, 4.3.0, 6.0.0, and 6.1.0 is vulnerable to a stack based buffer ovreflow, caused by improper bounds checking. A local attacker could manipulate CD UNIX to obtain root provileges. IBM X-Force ID: 184578.
Ссылки
- VDB EntryVendor Advisory
- Vendor Advisory
- VDB EntryVendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:ibm:connect\:direct:6.0.0:*:*:*:*:unix:*:*
cpe:2.3:a:ibm:connect\:direct:6.1.0:*:*:*:*:unix:*:*
cpe:2.3:a:ibm:sterling_connect\:direct:4.2.0:*:*:*:*:unix:*:*
cpe:2.3:a:ibm:sterling_connect\:direct:4.3.0:*:*:*:*:unix:*:*
EPSS
Процентиль: 11%
0.00038
Низкий
8.4 High
CVSS3
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-787
Связанные уязвимости
github
больше 3 лет назад
IBM Sterling Connect:Direct for UNIX 4.2.0, 4.3.0, 6.0.0, and 6.1.0 is vulnerable to a stack based buffer ovreflow, caused by improper bounds checking. A local attacker could manipulate CD UNIX to obtain root provileges. IBM X-Force ID: 184578.
EPSS
Процентиль: 11%
0.00038
Низкий
8.4 High
CVSS3
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-787