First published: Wed Jul 12 2023(Updated: )
IBM Connect:Express for UNIX 1.5.0 is vulnerable to a buffer overflow that could allow a remote attacker to cause a denial of service through its browser UI. IBM X-Force ID: 254979.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Connect:Express for UNIX | <=1.5 | |
All of | ||
IBM Sterling Connect:Direct | =express_for_unix-1.5.0 | |
Any of | ||
IBM AIX | ||
Linux Kernel | ||
Oracle Solaris SPARC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32331 is considered a medium to high severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2023-32331, update IBM Sterling Connect:Express for UNIX to a version that addresses the buffer overflow vulnerability.
CVE-2023-32331 affects users of IBM Sterling Connect:Express for UNIX version 1.5.0.
CVE-2023-32331 is classified as a buffer overflow vulnerability.
Yes, CVE-2023-32331 could allow a remote attacker to exploit the vulnerability through the browser UI.