Vulnerability: IBM U2 UniVerse

The uvadm user may exploit a buffer overflow in the uvadmsh binary to take root. There is a buffer overflow when processing command line arguments. Without the -uv.install argument this issue is not exploitable, although the overflow still occurs. This vulnerability has only been confirmed for Linux.

For details, see http://www.secnetops.com/research/.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about IBM Australia

Show Comments