Lucene search

K
ibmIBM89F5FA1F387A962F6ED3EE2CA6FEAB40486E2A850CBF78F479588F9B3019FAA4
HistoryMar 18, 2021 - 5:53 p.m.

Security Bulletin: IBM Cloud Pak for Security vulnerable to a stack-based buffer overflow (CVE-2020-27221)

2021-03-1817:53:16
www.ibm.com
9
ibm cloud pak
security vulnerability
buffer overflow
cve-2020-27221
upgrading
eclipse openj9

EPSS

0.004

Percentile

74.6%

Summary

IBM Cloud Pak for Security v 1.6.0.0 and earlier is vulnerable to a stack-based buffer overflow when the virtual machine or JNI natives are converting from UTF-8 characters to platform encoding. This has been addressed in the most recent release of the product.

Vulnerability Details

CVEID:CVE-2020-27221
**DESCRIPTION:**Eclipse OpenJ9 is vulnerable to a stack-based buffer overflow when the virtual machine or JNI natives are converting from UTF-8 characters to platform encoding. By sending an overly long string, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/195353 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
Cloud Pak for Security (CP4S) 1.5.0.0
Cloud Pak for Security (CP4S) 1.4.0.0
Cloud Pak for Security (CP4S) 1.6.0.0
Cloud Pak for Security (CP4S) 1.5.0.1

Remediation/Fixes

Upgrade to IBM Cloud Pak for Security v 1.6.0.1 by following the instructions in <https://www.ibm.com/support/knowledgecenter/en/SSTDPP_1.6.0/platform/docs/security-pak/upgrading_160.html&gt;

Workarounds and Mitigations

None

EPSS

0.004

Percentile

74.6%

Related for 89F5FA1F387A962F6ED3EE2CA6FEAB40486E2A850CBF78F479588F9B3019FAA4