First published: Mon Jan 04 2021(Updated: )
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_2, 6.0.0.0 through 6.0.3.2, and 6.1.0.0 could allow a remote attacker to execute arbitrary code on the system, caused by the deserialization of untrusted data. By sending specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code with SYSTEM privileges. IBM X-Force ID: 172452.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM B2B Sterling Integrator | <=5.2.0.0 - 5.2.6.5_2 | |
IBM B2B Sterling Integrator | <=6.0.0.0 - 6.0.3.2 | |
IBM B2B Sterling Integrator | <=6.1.0.0 | |
IBM B2B Sterling Integrator | >=5.2.0.0<=5.2.6.5_2 | |
IBM B2B Sterling Integrator | >=6.0.0.0<=6.0.3.2 | |
IBM B2B Sterling Integrator | =6.1.0.0 | |
HPE HP-UX | ||
IBM AIX | ||
IBM i | ||
Linux Kernel | ||
Microsoft Windows | ||
Oracle Solaris SPARC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-4728 has a critical severity rating due to the potential for remote code execution.
To fix CVE-2019-4728, upgrade the IBM Sterling B2B Integrator to the latest patched version as provided by IBM.
CVE-2019-4728 affects IBM Sterling B2B Integrator versions 5.2.0.0 through 5.2.6.5_2, 6.0.0.0 through 6.0.3.2, and 6.1.0.0.
Yes, CVE-2019-4728 can be exploited remotely by an attacker sending specially crafted requests.
CVE-2019-4728 is classified as a deserialization vulnerability that allows arbitrary code execution.