Vulnerability: IBM U2 UniVerse

The uvadm user may exploit a buffer overflow in the uvadmsh binary to take root. There is a buffer overflow when processing command line arguments. Without the -uv.install argument this issue is not exploitable, although the overflow still occurs. This vulnerability has only been confirmed for Linux.

For details, see http://www.secnetops.com/research/.

Join the newsletter!

Error: Please check your email address.

More about IBM Australia

Show Comments

Market Place