First published: Wed Apr 10 2019(Updated: )
IBM Sterling Connect:Direct for UNIX 4.2.0, 4.3.0, and 6.0.0 could allow a user with restricted sudo access on a system to manipulate CD UNIX to gain full sudo access. IBM X-Force ID: 152532.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Connect:Direct | =direct-4.2.0 | |
IBM Sterling Connect:Direct | =direct-4.3.0 | |
IBM Sterling Connect:Direct | =direct-6.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1903 has been classified as a medium severity vulnerability that can potentially allow unauthorized access.
To mitigate CVE-2018-1903, update your IBM Sterling Connect:Direct for UNIX to the latest patched version.
CVE-2018-1903 affects users of IBM Sterling Connect:Direct for UNIX versions 4.2.0, 4.3.0, and 6.0.0.
A user with restricted sudo access can exploit CVE-2018-1903 to gain full sudo access, potentially compromising system integrity.
Yes, versions of IBM Sterling Connect:Direct for UNIX released after 6.0.0 are not affected by CVE-2018-1903.