First published: Wed Mar 29 2023(Updated: )
Rocket Software UniData versions prior to 8.2.4 build 3003 and UniVerse versions prior to 11.3.5 build 1001 or 12.2.1 build 2002 suffer from a stack-based buffer overflow, where a string is copied into a buffer using a memcpy-like function and a user-provided length. This requires a valid login to exploit.
Credit: cve@rapid7.con cve@rapid7.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Rocket Software UniData | <=8.2.4 | |
UniVerse | <=11.3.5 | |
UniVerse | >=12.0.0<=12.2.1 | |
Linux Kernel | ||
Rocket Software UniData | <=8.2.4 | |
UniVerse | <=11.3.5 | |
UniVerse | >=12.0.0<=12.2.1 | |
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28506 is classified as a moderate severity vulnerability due to its potential impact through a stack-based buffer overflow.
To fix CVE-2023-28506, upgrade to Rocket Software UniData version 8.2.4 build 3003 or UniVerse version 11.3.5 build 1001 or 12.2.1 build 2002.
CVE-2023-28506 can be exploited by attackers with valid login credentials to execute arbitrary code on the affected systems.
CVE-2023-28506 affects Rocket Software UniData versions prior to 8.2.4 build 3003 and UniVerse versions prior to 11.3.5 build 1001 and 12.2.1 build 2002.
Yes, a valid login is required to exploit the buffer overflow vulnerability indicated by CVE-2023-28506.