Multiple vulnerabilities in IBM Cloud Pak System third-party components



Published: 2022-08-22 | Updated: 2022-09-21
Risk Critical
Patch available YES
Number of vulnerabilities 14
CVE-ID CVE-2021-46143
CVE-2021-3999
CVE-2021-35942
CVE-2022-0778
CVE-2021-23840
CVE-2021-23841
CVE-2021-44790
CVE-2021-23450
CVE-2022-22720
CVE-2022-22822
CVE-2022-23218
CVE-2022-23852
CVE-2021-45960
CVE-2022-23219
CWE-ID CWE-190
CWE-193
CWE-835
CWE-20
CWE-476
CWE-119
CWE-94
CWE-444
CWE-400
Exploitation vector Network
Public exploit Public exploit code for vulnerability #4 is available.
Vulnerable software
Subscribe
IBM Cloud Pak System
Server applications / Server solutions for antivurus protection

Vendor IBM Corporation

Security Bulletin

This security bulletin contains information about 14 vulnerabilities.

1) Integer overflow

EUVDB-ID: #VU59643

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-46143

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the doProlog() function in xmlparse.c. A remote attacker can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Cloud Pak System: 2.3.0 - 2.3.3.4


CPE2.3 External links

http://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-expat-glibc-http-server-dojo-openssl-shipped-with-ibm-cloud-pak-system/
http://www.ibm.com/support/pages/node/6612587

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

2) Off-by-one

EUVDB-ID: #VU61293

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-3999

CWE-ID: CWE-193 - Off-by-one Error

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the system.

The vulnerability exists due to an off-by-one error glibc getcwd() function. A remote attacker can pass specially crafted input to the application that is using the affected library version, trigger an off-by-one error and execute arbitrary code on the target system.


Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Cloud Pak System: 2.3.0 - 2.3.3.4


CPE2.3 External links

http://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-expat-glibc-http-server-dojo-openssl-shipped-with-ibm-cloud-pak-system/
http://www.ibm.com/support/pages/node/6612587

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

3) Integer overflow

EUVDB-ID: #VU55972

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2021-35942

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information or perform a DoS attack.

The vulnerability exists due to integer overflow in parse_param in posix/wordexp.c in the GNU C Library when called with an untrusted pattern. A remote attacker can pass specially crafted data to the application, trigger integer overflow and read arbitrary memory on the system of perform a denial of service (DoS) attack.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Cloud Pak System: 2.3.0 - 2.3.3.4


CPE2.3 External links

http://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-expat-glibc-http-server-dojo-openssl-shipped-with-ibm-cloud-pak-system/
http://www.ibm.com/support/pages/node/6612587

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

4) Infinite loop

EUVDB-ID: #VU61391

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-0778

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the BN_mod_sqrt() function when processing an ASN.1 certificate that contains elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. A remote attacker can supply a specially crafted certificate to the TLS server or client, consume all available system resources and cause denial of service conditions.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Cloud Pak System: 2.3.0 - 2.3.3.4


CPE2.3 External links

http://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-expat-glibc-http-server-dojo-openssl-shipped-with-ibm-cloud-pak-system/
http://www.ibm.com/support/pages/node/6612587

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

5) Input validation error

EUVDB-ID: #VU50745

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2021-23840

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input during EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate calls. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Cloud Pak System: 2.3.0 - 2.3.3.4


CPE2.3 External links

http://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-expat-glibc-http-server-dojo-openssl-shipped-with-ibm-cloud-pak-system/
http://www.ibm.com/support/pages/node/6612587

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

6) NULL pointer dereference

EUVDB-ID: #VU50740

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2021-23841

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the X509_issuer_and_serial_hash() function when parsing the issuer field in the X509 certificate. A remote attacker can supply a specially crafted certificate, trigger a NULL pointer dereference error and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Cloud Pak System: 2.3.0 - 2.3.3.4


CPE2.3 External links

http://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-expat-glibc-http-server-dojo-openssl-shipped-with-ibm-cloud-pak-system/
http://www.ibm.com/support/pages/node/6612587

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

7) Buffer overflow

EUVDB-ID: #VU59056

Risk: Critical

CVSSv3.1:

CVE-ID: CVE-2021-44790

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when parsing multipart content in mod_lua. A remote attacker can send a specially crafted HTTP request to the affected web server, trigger buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Cloud Pak System: 2.3.0 - 2.3.3.4


CPE2.3 External links

http://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-expat-glibc-http-server-dojo-openssl-shipped-with-ibm-cloud-pak-system/
http://www.ibm.com/support/pages/node/6612587

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

8) Code Injection

EUVDB-ID: #VU60834

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-23450

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to execute arbitrary code on the system.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can inject and execute arbitrary script code via the setObject function.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Cloud Pak System: 2.3.0 - 2.3.3.4


CPE2.3 External links

http://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-expat-glibc-http-server-dojo-openssl-shipped-with-ibm-cloud-pak-system/
http://www.ibm.com/support/pages/node/6612587

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

9) Inconsistent interpretation of HTTP requests

EUVDB-ID: #VU61286

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-22720

CWE-ID: CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')

Exploit availability: No

Description

The vulnerability allows a remote attacker to preform HTTP request smuggling attacks.

The vulnerability exists due to improper validation of HTTP requests. A remote attacker can send a specially crafted HTTP request to the server and smuggle arbitrary HTTP headers.

Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Cloud Pak System: 2.3.0 - 2.3.3.4


CPE2.3 External links

http://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-expat-glibc-http-server-dojo-openssl-shipped-with-ibm-cloud-pak-system/
http://www.ibm.com/support/pages/node/6612587

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

10) Integer overflow

EUVDB-ID: #VU59645

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-22822

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the addBinding() function in xmlparse.c. A remote attacker can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Cloud Pak System: 2.3.0 - 2.3.3.4


CPE2.3 External links

http://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-expat-glibc-http-server-dojo-openssl-shipped-with-ibm-cloud-pak-system/
http://www.ibm.com/support/pages/node/6612587

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

11) Buffer overflow

EUVDB-ID: #VU61294

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-23218

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the svcunix_create() in the sunrpc module ib glibc. A remote attacker can pass specially crafted input to the application that is using the affected library version, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Cloud Pak System: 2.3.0 - 2.3.3.4


CPE2.3 External links

http://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-expat-glibc-http-server-dojo-openssl-shipped-with-ibm-cloud-pak-system/
http://www.ibm.com/support/pages/node/6612587

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

12) Integer overflow

EUVDB-ID: #VU59966

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-23852

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES. A remote attacker can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Cloud Pak System: 2.3.0 - 2.3.3.4


CPE2.3 External links

http://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-expat-glibc-http-server-dojo-openssl-shipped-with-ibm-cloud-pak-system/
http://www.ibm.com/support/pages/node/6612587

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

13) Resource exhaustion

EUVDB-ID: #VU59642

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2021-45960

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources in the storeAtts() function in xmlparse.c. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Cloud Pak System: 2.3.0 - 2.3.3.4


CPE2.3 External links

http://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-expat-glibc-http-server-dojo-openssl-shipped-with-ibm-cloud-pak-system/
http://www.ibm.com/support/pages/node/6612587

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

14) Buffer overflow

EUVDB-ID: #VU61295

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-23219

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the clnt_create() function in the sunrpc module. A remote attacker can pass specially crafted input to the application that is using the affected library version, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Cloud Pak System: 2.3.0 - 2.3.3.4


CPE2.3 External links

http://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-expat-glibc-http-server-dojo-openssl-shipped-with-ibm-cloud-pak-system/
http://www.ibm.com/support/pages/node/6612587

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###