IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: ibm

Published: 2020-10-29T15:50:34.071505Z

Updated: 2024-09-16T17:27:43.332Z

Reserved: 2019-12-30T00:00:00

Link: CVE-2020-4724

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2020-10-29T16:15:15.227

Modified: 2021-07-21T11:39:23.747

Link: CVE-2020-4724

cve-icon Redhat

No data.