First published: Fri Apr 03 2020(Updated: )
VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module may allow a vulnerable ActiveX component to be exploited resulting in a buffer overflow, which may lead to a denial-of-service condition and execution of arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
VISAM VBASE Automation Base | =11.5.0.2 | |
VISAM VBASE Pro-RT/ Server-RT (Web Remote) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10599 has been rated as a high severity vulnerability due to potential remote code execution and denial-of-service risks.
To remediate CVE-2020-10599, users should update VISAM VBASE Editor to version 11.5.0.3 or later and ensure the VBASE Web-Remote Module is also updated.
The impacts of CVE-2020-10599 include buffer overflow vulnerabilities that can lead to denial-of-service conditions and the execution of arbitrary code.
CVE-2020-10599 affects VISAM VBASE Editor version 11.5.0.2 and all versions of the VBASE Web-Remote Module.
There have been no confirmed reports of active exploitation of CVE-2020-10599, but it remains a serious risk due to its severe nature.