First published: Thu Dec 01 2016(Updated: )
Stack-based buffer overflow in the ax Shared Libraries in the Agent in IBM Tivoli Monitoring (ITM) 6.2.2 before FP9, 6.2.3 before FP5, and 6.3.0 before FP2 on Linux and UNIX allows local users to gain privileges via unspecified vectors.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tivoli Monitoring | =6.2.2 | |
IBM Tivoli Monitoring | =6.2.2.1 | |
IBM Tivoli Monitoring | =6.2.2.2 | |
IBM Tivoli Monitoring | =6.2.2.3 | |
IBM Tivoli Monitoring | =6.2.2.4 | |
IBM Tivoli Monitoring | =6.2.2.5 | |
IBM Tivoli Monitoring | =6.2.2.6 | |
IBM Tivoli Monitoring | =6.2.2.7 | |
IBM Tivoli Monitoring | =6.2.2.8 | |
IBM Tivoli Monitoring | =6.2.2.9 | |
IBM Tivoli Monitoring | =6.2.3 | |
IBM Tivoli Monitoring | =6.3.0 | |
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2946 is classified as a high severity vulnerability due to its potential for privilege escalation.
To fix CVE-2016-2946, update IBM Tivoli Monitoring to version 6.2.2 FP9 or later, 6.2.3 FP5 or later, or 6.3.0 FP2 or later.
CVE-2016-2946 affects local users on systems running vulnerable versions of IBM Tivoli Monitoring.
IBM Tivoli Monitoring versions 6.2.2 before FP9, 6.2.3 before FP5, and 6.3.0 before FP2 are vulnerable to CVE-2016-2946.
CVE-2016-2946 is a stack-based buffer overflow vulnerability.