First published: Thu Apr 04 2024(Updated: )
GNU C Library could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds write in the ISO-2022-CN-EXT plugin. By sending specially crafted input, an attacker could exploit this vulnerability to overwrite critical data structures and execute arbitrary code on the system or cause the application to crash.
Credit: 3ff69d7a-14f2-4f67-a097-88dee7810d18 3ff69d7a-14f2-4f67-a097-88dee7810d18
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security Verify Governance, Identity Manager software component | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager virtual appliance component | <=ISVG 10.0.2 | |
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u9 2.36-9+deb12u7 2.40-6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2961 is considered a critical vulnerability due to its potential for remote code execution.
CVE-2024-2961 can be exploited by sending specially crafted input to the affected system, causing an out-of-bounds write.
CVE-2024-2961 affects IBM Security Verify Governance, Identity Manager software and its virtual appliance, as well as specific versions of the glibc package in Debian.
To fix CVE-2024-2961, update to the latest patched versions of affected software and libraries as specified by your vendor.
Currently, there is no publicly documented workaround for CVE-2024-2961; applying the patch is strongly recommended.