First published: Wed Mar 29 2023(Updated: )
Rocket Software UniData versions prior to 8.2.4 build 3003 and UniVerse versions prior to 11.3.5 build 1001 or 12.2.1 build 2002 suffer from a buffer overflow in an API function, where a string is copied into a caller-provided buffer without checking the length. This requires a valid login to exploit.
Credit: cve@rapid7.con cve@rapid7.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Rocket Software UniData | <=8.2.4 | |
UniVerse | <=11.3.5 | |
UniVerse | >=12.0.0<=12.2.1 | |
Linux Kernel | ||
Rocket Software UniData | <=8.2.4 | |
UniVerse | <=11.3.5 | |
UniVerse | >=12.0.0<=12.2.1 | |
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28505 is classified as a buffer overflow vulnerability with a potentially high impact due to its exploitation requiring valid user credentials.
To fix CVE-2023-28505, upgrade Rocket Software UniData to version 8.2.4 build 3003 or higher and UniVerse to version 11.3.5 build 1001 or higher, or version 12.2.1 build 2002 or higher.
CVE-2023-28505 affects Rocket Software UniData versions prior to 8.2.4 build 3003.
CVE-2023-28505 impacts UniVerse versions prior to 11.3.5 build 1001 and versions between 12.0.0 and 12.2.1 builds below 2002.
Yes, a valid login is required to exploit the buffer overflow vulnerability in CVE-2023-28505.