- Revenera Community
- :
- FlexNet Publisher
- :
- FlexNet Publisher Knowledge Base
- :
- CVE-2018-20031 remediated in FlexNet Publisher
- Mark as New
- Mark as Read
- Subscribe
- Printer Friendly Page
- Report Inappropriate Content
CVE-2018-20031 remediated in FlexNet Publisher
CVE-2018-20031 remediated in FlexNet Publisher
Summary
CVE-2018-20031 has been discovered and remediated in FlexNet Publisher
Symptoms
****Only the following information is permitted to be distributed outside of Flexera Software and customers of FlexNet Publisher:
- CVE number
- CWE ID
- CVSS scores
- Reference to any publicly-available information
****
Depending upon the license model(s) you offer to your customers, you may or may not distribute one or both of these components to one or more of your customers. If you don’t distribute either of these components, there is no further action on your part. If you do, you must distribute to those same customers the security update mentioned in the Resolution section of this article.
This security vulnerability has been assigned the CVE ID number of CVE-2018-20031.
Cause
For security reasons, Flexera will not publish the cause of this security vulnerability.
Steps To Reproduce
For security reasons, Flexera Software will not publish the steps to reproduce this security vulnerability.
Resolution
The FlexNet Publisher 11.16.2 addresses the security vulnerability and is available from Flexera’s Product and License Center:
- FlexNet Publisher 2018 R4
We advise all FlexNet Publisher customers update lmgrd to FlexNet Publisher 11.16.2, and the vendor daemon as soon as possible after that. Please note that lmadmin or clients are not affected.
As a reminder, Flexera no longer distributes the lmgrd executables to end customers; your end customers can only receive the lmgrd executable from you.
Workaround
No workaround available.
Additional Information
Please be aware that network access to the FlexNet Publisher License Server would be necessary to perform any attack. Protecting the license server from unauthorized access is essential to minimize the opportunities for any of the vulnerabilities to be exploited. Customers are also strongly advised to follow best practice in protecting the license server from unauthorized access.
Related Documents
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20031
https://nvd.nist.gov/vuln/detail/CVE-2018-20031#vulnCurrentDescriptionTitle