First published: Fri Aug 21 2020(Updated: )
IBM Sterling Connect:Direct for UNIX 4.2.0, 4.3.0, 6.0.0, and 6.1.0 is vulnerable to a stack based buffer ovreflow, caused by improper bounds checking. A local attacker could manipulate CD UNIX to obtain root provileges. IBM X-Force ID: 184578.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Connect:Direct | <=6.1.0 | |
IBM Sterling Connect:Direct | <=6.0.0 | |
IBM Sterling Connect:Direct | <=4.3.0 | |
IBM Sterling Connect:Direct | <=4.2.0 | |
IBM Connect | =direct-6.0.0 | |
IBM Connect | =direct-6.1.0 | |
IBM Sterling Connect:Direct | =direct-4.2.0 | |
IBM Sterling Connect:Direct | =direct-4.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-4587 has a high severity rating due to its potential to allow local attackers to escalate privileges.
To mitigate CVE-2020-4587, it is recommended to apply the relevant patches provided by IBM for affected versions of Sterling Connect:Direct for UNIX.
CVE-2020-4587 affects IBM Sterling Connect:Direct for UNIX versions 4.2.0, 4.3.0, 6.0.0, and 6.1.0.
Organizations using vulnerable versions of IBM Sterling Connect:Direct for UNIX are at risk of exploitation through CVE-2020-4587.
CVE-2020-4587 enables a stack-based buffer overflow attack that could allow a local attacker to gain root privileges.