{ "problemtype": { "problemtype_data": [ { "description": [ { "value": "Gain Privileges", "lang": "eng" } ] } ] }, "data_format": "MITRE", "CVE_data_meta": { "DATE_PUBLIC": "2020-08-21T00:00:00", "ID": "CVE-2020-4587", "ASSIGNER": "psirt@us.ibm.com", "STATE": "PUBLIC" }, "impact": { "cvssv3": { "BM": { "A": "H", "PR": "N", "C": "H", "AV": "L", "S": "U", "I": "H", "UI": "N", "AC": "L", "SCORE": "8.400" }, "TM": { "RC": "C", "RL": "O", "E": "U" } } }, "data_type": "CVE", "description": { "description_data": [ { "lang": "eng", "value": "IBM Sterling Connect:Direct for UNIX 4.2.0, 4.3.0, 6.0.0, and 6.1.0 is vulnerable to a stack based buffer ovreflow, caused by improper bounds checking. A local attacker could manipulate CD UNIX to obtain root provileges. IBM X-Force ID: 184578." } ] }, "data_version": "4.0", "affects": { "vendor": { "vendor_data": [ { "vendor_name": "IBM", "product": { "product_data": [ { "version": { "version_data": [ { "version_value": "4.2.0" }, { "version_value": "4.3.0" } ] }, "product_name": "Sterling Connect:Direct for UNIX" }, { "version": { "version_data": [ { "version_value": "6.1.0" }, { "version_value": "6.0.0" } ] }, "product_name": "Connect:Direct for UNIX" } ] } } ] } }, "references": { "reference_data": [ { "url": "https://www.ibm.com/support/pages/node/6320317", "name": "https://www.ibm.com/support/pages/node/6320317", "title": "IBM Security Bulletin 6320317 (Connect:Direct for UNIX)", "refsource": "CONFIRM" }, { "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/184578", "name": "ibm-sterling-cve20204587-bo (184578)", "refsource": "XF" } ] } }