IBM Cloud Pak for Security v 1.6.0.0 and earlier is vulnerable to a stack-based buffer overflow when the virtual machine or JNI natives are converting from UTF-8 characters to platform encoding. This has been addressed in the most recent release of the product.
CVEID:CVE-2020-27221
**DESCRIPTION:**Eclipse OpenJ9 is vulnerable to a stack-based buffer overflow when the virtual machine or JNI natives are converting from UTF-8 characters to platform encoding. By sending an overly long string, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/195353 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Affected Product(s) | Version(s) |
---|---|
Cloud Pak for Security (CP4S) | 1.5.0.0 |
Cloud Pak for Security (CP4S) | 1.4.0.0 |
Cloud Pak for Security (CP4S) | 1.6.0.0 |
Cloud Pak for Security (CP4S) | 1.5.0.1 |
Upgrade to IBM Cloud Pak for Security v 1.6.0.1 by following the instructions in <https://www.ibm.com/support/knowledgecenter/en/SSTDPP_1.6.0/platform/docs/security-pak/upgrading_160.html>
None