First published: Wed Feb 01 2017(Updated: )
IBM AppScan Enterprise Edition could allow a remote attacker to execute arbitrary code on the system, caused by improper handling of objects in memory. By persuading a victim to open specially-crafted content, an attacker could exploit this vulnerability to execute arbitrary code on the system in the same context as the victim.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security AppScan | =9.0.0.0 | |
IBM Security AppScan | =9.0.0.1 | |
IBM Security AppScan | =9.0.1.0 | |
IBM Security AppScan | =9.0.1.1 | |
IBM Security AppScan | =9.0.2.0 | |
IBM Security AppScan | =9.0.2.1 | |
IBM Security AppScan | =9.0.3.0 | |
IBM Security AppScan | =9.0.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6042 is considered a critical vulnerability that allows remote code execution.
To remediate CVE-2016-6042, it is recommended to update IBM Security AppScan to the latest version as specified in IBM's security advisories.
The affected versions for CVE-2016-6042 include IBM Security AppScan versions 9.0.0.0 through 9.0.3.1.
Yes, CVE-2016-6042 can be exploited by tricking users into opening specially-crafted content, which can execute arbitrary code.
CVE-2016-6042 can facilitate various attack vectors, including remote code execution, allowing attackers to gain control of affected systems.