# IBM CICS TX 代码执行漏洞
## 漏洞概述
IBM CICS TX Standard 11.1 和 IBM CICS TX Advanced 10.1 及 11.1 版本中存在一个漏洞,该漏洞允许本地用户通过 `gethostbyaddr` 函数处理 DNS 返回请求失败,从而在系统上执行任意代码。
## 影响版本
- IBM CICS TX Standard 11.1
- IBM CICS TX Advanced 10.1
- IBM CICS TX Advanced 11.1
## 漏洞细节
该漏洞源于 `gethostbyaddr` 函数在处理 DNS 返回请求时存在处理不当的问题,导致本地用户能够利用此漏洞在系统上执行任意代码。
## 影响
本地用户可利用此漏洞在系统上执行任意代码,这可能导致系统的完整性和安全性受到严重威胁。
# | POC 描述 | 源链接 | 神龙链接 |
---|
标题: Security Bulletin: IBM TX Standard is affected by an Out-of-bounds Write vulnerability and by a Use of Inherently Dangerous Function vulnerability due to the way that the product uses certain C library functions. -- 🔗来源链接
标签: vendor-advisory
神龙速读标题: Security Bulletin: IBM TX Advanced is affected by an Out-of-bounds Write vulnerability and by a Use of Inherently Dangerous Function vulnerability due to the way that the product uses certain C library functions. -- 🔗来源链接
标签: vendor-advisory
神龙速读