IBM Concert 1.0.0 through 2.1.0 could allow an attacker to obtain sensitive information using man in the middle techniques due to improper clearing of heap memory.
Using realloc() to resize buffers that store sensitive information can leave the sensitive information exposed to attack, because it is not removed from memory.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Concert | Ibm | 1.0.0 (including) | 2.2.0 (excluding) |