Lucene search

K
ibmIBM8CFA6353E92C67EBCD5ACD0376ABEE4577AD902B830B8470F96D6163C3679123
HistoryApr 05, 2021 - 4:23 p.m.

Security Bulletin: A Buffer Overflow Vulnerability in IBM Java Runtime Affects IBM Sterling Connect:Direct FTP+

2021-04-0516:23:18
www.ibm.com
16

0.004 Low

EPSS

Percentile

74.6%

Summary

There is a vulnerability in IBM® Runtime Environment Java™ Version 8.0.6.15, used by IBM Sterling Connect:Direct FTP+ on AIX and Linux platforms. IBM Sterling Connect:Direct FTP+ has addressed the applicable CVE.

Vulnerability Details

CVEID:CVE-2020-27221
**DESCRIPTION:**Eclipse OpenJ9 is vulnerable to a stack-based buffer overflow when the virtual machine or JNI natives are converting from UTF-8 characters to platform encoding. By sending an overly long string, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/195353 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
Sterling Connect:Direct FTP+ 1.3

Remediation/Fixes

V.R.M.F APAR Remediation/First Fix
1.3.0 IT36153 Apply 1.3.0.iFix019, available on Fix Central.
For versions previous to 1.3.0, IBM recommends upgrading to a fixed, supported version of the product.

Workarounds and Mitigations

None

0.004 Low

EPSS

Percentile

74.6%

Related for 8CFA6353E92C67EBCD5ACD0376ABEE4577AD902B830B8470F96D6163C3679123