Security Bulletin
Summary
IBM Sterling Connect:Express for UNIX is vulnerable to a heap-based buffer overflow, caused by improper bounds checking in the FTP service. A remote attacker could overflow a buffer and execute arbitrary commands or cause a denial of service.
Vulnerability Details
CVE-ID: CVE-2019-4599
Description: ALLO function call does not require authentication and allows storing data within a static buffer located in the BSS section - rem_file. The total size of input datais not enforced, leading the program to make operate a full copy inside this limited size buffer.
CVSS Base Score: 8.4
CVSS Temporal Score: https://exchange.xforce.ibmcloud.com/vulnerabilities/167882 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products and Versions
IBM Sterling Connect:Express for UNIX 1.5.0.16
- All versions prior to 1.5.0.15 iFix 150-1601
Remediation/Fixes
| VRMF | APAR | Remediation/First Fix |
|---|---|---|
| 1.5.0.16 | None |
Apply 1.5.0.15 iFix 150-1602, available on Fix Central.
|
Workarounds and Mitigations
Get Notified about Future Security Bulletins
References
Change History
14 October 2019: Original document published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
24 July 2020
UID
ibm11078431