Rocket Software UniData versions prior to 8.2.4 build 3003 and UniVerse versions prior to 11.3.5 build 1001 or 12.2.1 build 2002 suffer from a buffer overflow in an API function, where a string is copied into a caller-provided buffer without checking the length. This requires a valid login to exploit.
References
Link | Resource |
---|---|
https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ | Third Party Advisory |
https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ - Third Party Advisory |
Information
Published : 2023-03-29 21:15
Updated : 2024-11-21 07:55
NVD link : CVE-2023-28505
Mitre link : CVE-2023-28505
CVE.ORG link : CVE-2023-28505
JSON object : View
Products Affected
rocketsoftware
- unidata
- universe
linux
- linux_kernel
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')