First published: Mon May 27 2024(Updated: )
Eclipse Openj9 could allow a local authenticated attacker to bypass security restrictions, caused by the failure to restrict access to a buffer with an incorrect length value when executing an arraycopy sequence while the Concurrent Scavenge Garbage Collection cycle is active and the source and destination memory regions for arraycopy overlap. By sending a specially crafted request, an attacker could exploit this vulnerability to gain read and write to addresses beyond the end of the array range.
Credit: emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse Openj9 | >=0.13.0<0.44.0 | |
IBM Spectrum Protect | <=8.1.0.0 - 8.1.23.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3933 is classified as a medium severity vulnerability due to the potential for local authenticated attackers to bypass security restrictions.
To mitigate CVE-2024-3933, updating to the fixed versions of Eclipse Openj9 or IBM Storage Protect Backup-Archive Client is recommended.
CVE-2024-3933 affects users of Eclipse Openj9 versions from 0.13.0 to 0.44.0 and IBM Storage Protect Backup-Archive Client versions up to 8.1.23.0.
CVE-2024-3933 allows local authenticated attackers to potentially bypass security restrictions through improper buffer access.
There are no specific workarounds available for CVE-2024-3933; updating is the recommended action.