First published: Fri Apr 23 2021(Updated: )
IBM Spectrum Protect Client 8.1.0.0-8 through 1.11.0 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking when processing the current locale settings. A local attacker could overflow a buffer and execute arbitrary code on the system with elevated privileges or cause the application to crash. IBM X-Force ID: 199479
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Spectrum Protect client | >=8.1.0.0<=8.1.11.0 | |
Ibm Spectrum Protect For Space Management | >=8.1.0.0<=8.1.11.0 | |
<=8.1.0.0-8.1.11.07.1.0.0-7.1.8.10 | ||
<=8.1.0.0-8.1.11.07.1.0.0-7.1.8.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-29672 is high with a CVSS score of 8.4.
IBM Spectrum Protect Client versions 8.1.0.0-8 through 1.11.0 and IBM Spectrum Protect for Space Management versions 8.1.0.0-8 through 1.11.0 are affected.
CVE-2021-29672 is a stack-based buffer overflow vulnerability that is exploited by a local attacker overflowing a buffer and executing arbitrary code on the system with elevated privileges or causing a denial-of-service condition.
Yes, you can find references for CVE-2021-29672 at the following links: [Reference 1](https://exchange.xforce.ibmcloud.com/vulnerabilities/199479), [Reference 2](https://security.gentoo.org/glsa/202209-02), [Reference 3](https://www.ibm.com/support/pages/node/6445497).
The Common Weakness Enumeration (CWE) ID for CVE-2021-29672 is CWE-119 and CWE-787.