CNVD-2020-28959
Vulnerability from cnvd - Published: 2020-05-19
VLAI Severity ?
Title
IBM i2 Analysts Notebook和IBM i2 Analysts Notebook Premium缓冲区溢出漏洞(CNVD-2020-28959)
Description
IBM i2 Analysts Notebook和IBM i2 Analysts Notebook Premium都是美国IBM公司的产品。IBM i2 Analysts Notebook是一款数据可视化分析工具。该产品支持数据存储和数据分析等功能。IBM i2 Analysts Notebook Premium是IBM i2 Analysts Notebook的高级版本。
IBM i2 Analysts Notebook 9.2.1版本和i2 Analysts Notebook Premium 9.2.1版本中存在安全漏洞。本地攻击者可利用该漏洞通过诱使用户打开特制文件在系统上执行任意代码。
Severity
中
Patch Name
IBM i2 Analysts Notebook和IBM i2 Analysts Notebook Premium缓冲区溢出漏洞(CNVD-2020-28959)的补丁
Patch Description
IBM i2 Analysts Notebook和IBM i2 Analysts Notebook Premium都是美国IBM公司的产品。IBM i2 Analysts Notebook是一款数据可视化分析工具。该产品支持数据存储和数据分析等功能。IBM i2 Analysts Notebook Premium是IBM i2 Analysts Notebook的高级版本。
IBM i2 Analysts Notebook 9.2.1版本和i2 Analysts Notebook Premium 9.2.1版本中存在安全漏洞。本地攻击者可利用该漏洞通过诱使用户打开特制文件在系统上执行任意代码。 目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://www.ibm.com/support/pages/node/6209081
Reference
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-memory-corruption-vulnerabilities-in-ibm-i2-analysts-notebook-and-ibm-i2-analysts-notebook-premium/
Impacted products
| Name | ['IBM i2 Analysts Notebook 9.2.1', 'IBM i2 Analysts Notebook Premium 9.2.1'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-4265"
}
},
"description": "IBM i2 Analysts Notebook\u548cIBM i2 Analysts Notebook Premium\u90fd\u662f\u7f8e\u56fdIBM\u516c\u53f8\u7684\u4ea7\u54c1\u3002IBM i2 Analysts Notebook\u662f\u4e00\u6b3e\u6570\u636e\u53ef\u89c6\u5316\u5206\u6790\u5de5\u5177\u3002\u8be5\u4ea7\u54c1\u652f\u6301\u6570\u636e\u5b58\u50a8\u548c\u6570\u636e\u5206\u6790\u7b49\u529f\u80fd\u3002IBM i2 Analysts Notebook Premium\u662fIBM i2 Analysts Notebook\u7684\u9ad8\u7ea7\u7248\u672c\u3002\n\nIBM i2 Analysts Notebook 9.2.1\u7248\u672c\u548ci2 Analysts Notebook Premium 9.2.1\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u8bf1\u4f7f\u7528\u6237\u6253\u5f00\u7279\u5236\u6587\u4ef6\u5728\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.ibm.com/support/pages/node/6209081",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2020-28959",
"openTime": "2020-05-19",
"patchDescription": "IBM i2 Analysts Notebook\u548cIBM i2 Analysts Notebook Premium\u90fd\u662f\u7f8e\u56fdIBM\u516c\u53f8\u7684\u4ea7\u54c1\u3002IBM i2 Analysts Notebook\u662f\u4e00\u6b3e\u6570\u636e\u53ef\u89c6\u5316\u5206\u6790\u5de5\u5177\u3002\u8be5\u4ea7\u54c1\u652f\u6301\u6570\u636e\u5b58\u50a8\u548c\u6570\u636e\u5206\u6790\u7b49\u529f\u80fd\u3002IBM i2 Analysts Notebook Premium\u662fIBM i2 Analysts Notebook\u7684\u9ad8\u7ea7\u7248\u672c\u3002\r\n\r\nIBM i2 Analysts Notebook 9.2.1\u7248\u672c\u548ci2 Analysts Notebook Premium 9.2.1\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u8bf1\u4f7f\u7528\u6237\u6253\u5f00\u7279\u5236\u6587\u4ef6\u5728\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002 \u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "IBM i2 Analysts Notebook\u548cIBM i2 Analysts Notebook Premium\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2020-28959\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"IBM i2 Analysts Notebook 9.2.1",
"IBM i2 Analysts Notebook Premium 9.2.1"
]
},
"referenceLink": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-memory-corruption-vulnerabilities-in-ibm-i2-analysts-notebook-and-ibm-i2-analysts-notebook-premium/",
"serverity": "\u4e2d",
"submitTime": "2020-05-15",
"title": "IBM i2 Analysts Notebook\u548cIBM i2 Analysts Notebook Premium\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2020-28959\uff09"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…