Lucene search

K
ibmIBM4DF6EC9D4B67040E5574DA7E6553409BB12B9ABC75FDD0EC1FC57FA757B6C604
HistoryOct 30, 2020 - 7:22 p.m.

Security Bulletin: A Remote Vulnerability Affects IBM Sterling Connect:Direct for Microsoft Windows (CVE-2020-4767)

2020-10-3019:22:16
www.ibm.com
6

0.001 Low

EPSS

Percentile

47.9%

Summary

IBM Sterling Connect:Direct for Microsoft Windows could allow a remote attacker to cause a denial of service, caused by a buffer over-read. IBM Sterling Connect:Direct for Microsoft Windows has addressed the applicable CVE.

Vulnerability Details

CVEID:CVE-2020-4767
**DESCRIPTION:**IBM Sterling Connect:Direct for Microsoft Windows could allow a remote attacker to cause a denial of service, caused by a buffer over-read. Bysending a specially crafted request, the attacker could cause the application to crash.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/188906 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Sterling Connect Direct for Microsoft Windows 4.8
Sterling Connect Direct for Microsoft Windows 4.7
IBM Connect Direct for Microsoft Windows 6.0
IBM Connect Direct for Microsoft Windows 6.1

Remediation/Fixes

Affected Product(s) Version(s) APAR Remediation / First Fix
Sterling Connect Direct for Microsoft Windows 4.7 IT34442 Apply 4.7.0.7_iFix018, available on Fix Central
IBM Sterling Connect Direct for Microsoft Windows 4.8 IT34442 Apply 4.8.0.3_iFix024, available on Fix Central
IBM Connect Direct for Microsoft Windows 6.0 IT34442 Apply 6.0.0.4_iFix021, available on Fix Central
IBM Connect Direct for Microsoft Windows 6.1 IT34442 Apply 6.1.0.1_iFix001, available on Fix Central

For older versions IBM recommends upgrading to a fixed, supported version of the product.

Workarounds and Mitigations

None

0.001 Low

EPSS

Percentile

47.9%

Related for 4DF6EC9D4B67040E5574DA7E6553409BB12B9ABC75FDD0EC1FC57FA757B6C604