First published: Mon Jun 08 2020(Updated: )
Certain IBM Aspera applications are vulnerable to buffer overflow based on the product configuration and valid authentication, which could allow an attacker with intimate knowledge of the system to execute arbitrary code or perform a denial-of-service (DoS) through the http fallback service.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Aspera High-Speed Transfer Server | <=3.9.3 and earlier | |
IBM Aspera High-Speed Transfer Endpoint | <=3.9.3 and earlier | |
IBM Aspera Proxy Server | <=1.4.3 and earlier | |
IBM Aspera Transfer Cluster Manager | <=1.3.1 with Aspera High-Speed Transfer Server 3.9.3 and earlier | |
IBM Aspera Application Platform On Demand | <=3.7.4 and earlier | |
IBM Aspera Faspex On Demand | <=3.7.4 and earlier | |
IBM Aspera Server On Demand | <=3.7.4 and earlier | |
IBM Aspera Shares On Demand | <=3.7.4 and earlier | |
IBM Aspera Streaming | <=3.9.3 and earlier | |
IBM Aspera High-Speed Transfer Server for Cloud Pak for Integration | <=3.9.10 and earlier | |
IBM Aspera Application Platform On Demand | <=3.7.4 | |
IBM Aspera Faspex On Demand | <=3.7.4 | |
IBM Aspera High-Speed Transfer Endpoint | <=3.9.3 | |
IBM Aspera High-Speed Transfer Server | <=3.9.3 | |
IBM Aspera High-Speed Transfer Server | <=3.9.10 | |
IBM Aspera Proxy Server | <=1.4.3 | |
IBM Aspera Server On Demand | <=3.7.4 | |
IBM Aspera Shares On Demand | <=3.7.4 | |
IBM Aspera Streaming | <=3.9.3 | |
IBM Aspera Transfer Cluster Manager | <=1.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-4434 is classified with a high severity level due to the potential for remote code execution and denial-of-service scenarios.
To mitigate CVE-2020-4434, upgrade all affected IBM Aspera products to the latest versions as specified in the vendor's security advisory.
CVE-2020-4434 affects multiple IBM Aspera products including High-Speed Transfer Server, Endpoint, Proxy Server, and others listed in the advisory.
Exploitation of CVE-2020-4434 requires valid authentication, making it necessary for an attacker to have legitimate access to the system.
CVE-2020-4434 may allow attackers to execute arbitrary code or cause a denial-of-service (DoS) through the HTTP fallback service.