Overview
- Description
- IBM Sterling Connect:Direct for UNIX 4.2.0, 4.3.0, 6.0.0, and 6.1.0 is vulnerable to a stack based buffer ovreflow, caused by improper bounds checking. A local attacker could manipulate CD UNIX to obtain root provileges. IBM X-Force ID: 184578.
- Source
- psirt@us.ibm.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 3.0
- Type
- Secondary
- Base score
- 8.4
- Impact score
- 5.9
- Exploitability score
- 2.5
- Vector string
- CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-787
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:connect\\:direct:6.0.0:*:*:*:*:unix:*:*", "vulnerable": true, "matchCriteriaId": "23A0E317-0293-4357-B943-B94924BE2FD5" }, { "criteria": "cpe:2.3:a:ibm:connect\\:direct:6.1.0:*:*:*:*:unix:*:*", "vulnerable": true, "matchCriteriaId": "70B07868-83AC-40EF-B193-FC9825424878" }, { "criteria": "cpe:2.3:a:ibm:sterling_connect\\:direct:4.2.0:*:*:*:*:unix:*:*", "vulnerable": true, "matchCriteriaId": "30BE94F1-F851-4BE9-BDE3-7B2DBB7719F2" }, { "criteria": "cpe:2.3:a:ibm:sterling_connect\\:direct:4.3.0:*:*:*:*:unix:*:*", "vulnerable": true, "matchCriteriaId": "DE4B0D2D-2A5C-44C5-9FFC-CB4381C5D471" } ], "operator": "OR" } ] } ]