Buffer Overflow Vulnerability in Connect:Express for UNIX Could Lead to Denial of Service
CVE-2023-32331
Summary
IBM Connect:Express for UNIX version 1.5.0 is exposed to a buffer overflow vulnerability that can be exploited by remote attackers through the application's browser-based user interface. Successful exploitation may result in denial of service, impacting the availability of the service. Organizations utilizing this product should evaluate their security posture and consider implementing mitigations to safeguard against potential exploits.
Affected Version(s)
Sterling Connect:Express for UNIX 1.5.0
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles
CVE-2023-32331 : IBM STERLING CONNECT EXPRESS 1.5.0 ON UNIX MEMORY CORRUPTION - Cloud WAF
CVE-2023-32331 : IBM Connect:Express for UNIX 1.5.0 is vulnerable to a buffer overflow that could allow a remote attacker to cause a denial of service through its browser UI. IBM X-Force ID: 254979.
11 months ago
References
CVSS V3.1
Timeline
- 📰
First article discovered by prophaze.com
Vulnerability published
Vulnerability Reserved