First published: Fri Apr 23 2021(Updated: )
IBM Spectrum Protect Client 8.1.0.0 through 8.1.11.0 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local attacker could overflow a buffer and cause the application to crash. IBM X-Force ID: 198934
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Spectrum Protect client | >=8.1.0.0<=8.1.11.0 | |
Ibm Spectrum Protect For Space Management | >=8.1.0.0<=8.1.11.0 | |
<=8.1.0.0-8.1.11.07.1.0.0-7.1.8.10 | ||
<=8.1.0.0-8.1.11.07.1.0.0-7.1.8.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this IBM Spectrum Protect Client vulnerability is CVE-2021-20546.
The title of this vulnerability is 'IBM Spectrum Protect Client is vulnerable to a stack-based buffer overflow caused by improper bounds checking'.
The severity of CVE-2021-20546 is medium.
A local attacker can exploit this vulnerability by overflowing a buffer and causing the application to crash.
The affected software for this vulnerability includes IBM Spectrum Protect Client (version 8.1.0.0 through 8.1.11.0), IBM Spectrum Protect for Space Management (version 8.1.0.0 through 8.1.11.0), IBM Spectrum Protect Backup-Archive Client (version 8.1.0.0-8.1.11.07.1.0.0-7.1.8.10), and IBM Spectrum Protect for Space Management (version 8.1.0.0-8.1.11.07.1.0.0-7.1.8.10).