First published: Fri Dec 10 2021(Updated: )
IBM Spectrum Protect Client 7.1 and 8.1 is vulnerable to a stack based buffer overflow, caused by improper bounds checking. A local attacker could exploit this vulnerability and cause a denial of service. IBM X-Force ID: 214438.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Spectrum Protect Backup-Archive Client | >=8.1.0.0<=8.1.12.0 | |
IBM AIX | ||
Linux Linux kernel | ||
Oracle Solaris | ||
IBM Spectrum Protect Backup-Archive Client | >=7.1.0.0<=7.1.8.10 | |
HP HP-UX | ||
Ibm Spectrum Protect For Space Management | >=8.1.0.0<=8.1.12.0 | |
Ibm Spectrum Protect For Space Management | >=7.1.0.0<=7.1.8.10 | |
<=8.1.0.0-8.1.12.0 on AIX, Linux, and Solaris platforms7.1.0.0-7.1.8.10 on AIX, Linux, Solaris, and HP-UX platforms | ||
<=8.1.0.0-8.1.12.0 on AIX and Linux platforms7.1.0.0-7.1.8.10 on AIX and Linux platforms |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39048 is a vulnerability in IBM Spectrum Protect Client that allows for a stack-based buffer overflow, leading to a denial of service.
IBM Spectrum Protect Client versions 7.1.0.0-7.1.8.10 and 8.1.0.0-8.1.12.0 on AIX, Linux, Solaris, and HP-UX platforms are affected by CVE-2021-39048.
CVE-2021-39048 has a severity rating of 6.2, classified as medium.
To fix the CVE-2021-39048 vulnerability, it is recommended to update IBM Spectrum Protect Client to versions that are not vulnerable, such as versions beyond 7.1.8.10 and 8.1.12.0.
For more information about CVE-2021-39048, you can visit the IBM X-Force ID: 214438 page or refer to the IBM support page.