First published: Fri Nov 25 2016(Updated: )
IBM Sterling Connect:Direct 4.5.00, 4.5.01, 4.6.0 before 4.6.0.6 iFix008, and 4.7.0 before 4.7.0.4 on Windows allows local users to gain privileges via unspecified vectors.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Connect:Direct | =direct-4.5 | |
IBM Sterling Connect:Direct | =direct-4.5.01 | |
IBM Sterling Connect:Direct | =direct-4.6 | |
IBM Sterling Connect:Direct | =direct-4.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5991 has been classified with a medium severity level due to its potential for privilege escalation.
To mitigate CVE-2016-5991, upgrade IBM Sterling Connect:Direct to version 4.6.0.6 iFix008 or 4.7.0.4 or later.
CVE-2016-5991 affects local users of IBM Sterling Connect:Direct versions 4.5.00, 4.5.01, 4.6.0 prior to 4.6.0.6 iFix008, and 4.7.0 before 4.7.0.4 on Windows.
CVE-2016-5991 is a privilege escalation vulnerability that allows local users to gain elevated privileges.
No specific workaround is documented for CVE-2016-5991; the recommended action is to apply the necessary updates.