First published: Sun Jun 04 2023(Updated: )
IBM Aspera Connect 4.2.5 and IBM Aspera Cargo 4.2.5 is vulnerable to a buffer overflow, caused by improper bounds checking. An attacker could overflow a buffer and execute arbitrary code on the system. IBM X-Force ID: 248625.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Aspera Cargo | <4.2.6 | |
IBM Aspera Connect | <4.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27285 has a high severity level due to the potential for arbitrary code execution through a buffer overflow.
To address CVE-2023-27285, upgrade to IBM Aspera Connect and IBM Aspera Cargo versions 4.2.6 or later.
CVE-2023-27285 affects IBM Aspera Connect and IBM Aspera Cargo versions prior to 4.2.6.
Yes, CVE-2023-27285 can lead to data breaches if an attacker successfully exploits the buffer overflow.
CVE-2023-27285 enables remote code execution attacks due to improper bounds checking in the affected software.