First published: Mon May 27 2024(Updated: )
Eclipse Openj9 could allow a local authenticated attacker to bypass security restrictions, caused by the failure to restrict access to a buffer with an incorrect length value when executing an arraycopy sequence while the Concurrent Scavenge Garbage Collection cycle is active and the source and destination memory regions for arraycopy overlap. By sending a specially crafted request, an attacker could exploit this vulnerability to gain read and write to addresses beyond the end of the array range.
Credit: emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Secure Proxy | <=6.0.0.06.0.1.06.0.2.06.0.3.0 | |
IBM Sterling Secure Proxy | <=6.1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.