Multiple vulnerabilities in IBM Aspera Faspex



Published: 2022-10-03 | Updated: 2022-11-07
Risk High
Patch available YES
Number of vulnerabilities 18
CVE-ID CVE-2021-23840
CVE-2022-22721
CVE-2022-22720
CVE-2021-36160
CVE-2021-3712
CVE-2021-33193
CVE-2022-23943
CVE-2021-4160
CVE-2021-23841
CVE-2021-23839
CVE-2019-20838
CVE-2021-41182
CVE-2021-41183
CVE-2021-41184
CVE-2022-22719
CVE-2020-1971
CVE-2021-34798
CVE-2021-39275
CWE-ID CWE-20
CWE-190
CWE-444
CWE-125
CWE-787
CWE-310
CWE-476
CWE-79
CWE-119
Exploitation vector Network
Public exploit Public exploit code for vulnerability #14 is available.
Public exploit code for vulnerability #16 is available.
Vulnerable software
Subscribe
IBM Aspera Faspex for Windows
Web applications / Other software

IBM Aspera Faspex for Linux
Web applications / Other software

Vendor IBM Corporation

Security Bulletin

This security bulletin contains information about 18 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU50745

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-23840

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input during EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate calls. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Aspera Faspex for Windows: before 4.4.2

IBM Aspera Faspex for Linux: before 4.4.2

External links

http://www.ibm.com/blogs/psirt/security-bulletin-ibm-aspera-faspex-4-4-2-has-addressed-multiple-security-vulnerabilities/
http://www.cybersecurity-help.cz/dashboard/admin/vulnerabilities/advisories/detail.php?ADVISORY_ID=688314&SOURCE_ID=163


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Integer overflow

EUVDB-ID: #VU61285

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-22721

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow within the ap_escape_html2() function when parsing LimitXMLRequestBody. A remote attacker can send a specially crafted request to the web server, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Aspera Faspex for Windows: before 4.4.2

IBM Aspera Faspex for Linux: before 4.4.2

External links

http://www.ibm.com/blogs/psirt/security-bulletin-ibm-aspera-faspex-4-4-2-has-addressed-multiple-security-vulnerabilities/
http://www.cybersecurity-help.cz/dashboard/admin/vulnerabilities/advisories/detail.php?ADVISORY_ID=688314&SOURCE_ID=163


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Inconsistent interpretation of HTTP requests

EUVDB-ID: #VU61286

Risk: Medium

CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-22720

CWE-ID: CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')

Exploit availability: No

Description

The vulnerability allows a remote attacker to preform HTTP request smuggling attacks.

The vulnerability exists due to improper validation of HTTP requests. A remote attacker can send a specially crafted HTTP request to the server and smuggle arbitrary HTTP headers.

Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Aspera Faspex for Windows: before 4.4.2

IBM Aspera Faspex for Linux: before 4.4.2

External links

http://www.ibm.com/blogs/psirt/security-bulletin-ibm-aspera-faspex-4-4-2-has-addressed-multiple-security-vulnerabilities/
http://www.cybersecurity-help.cz/dashboard/admin/vulnerabilities/advisories/detail.php?ADVISORY_ID=688314&SOURCE_ID=163


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Out-of-bounds read

EUVDB-ID: #VU56680

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-36160

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in the mod_proxy_uwsgi module in Apache HTTP Server. A remote attacker can send an HTTP request with specially crafted uri-path, trigger an out-of-bounds read and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Aspera Faspex for Windows: before 4.4.2

IBM Aspera Faspex for Linux: before 4.4.2

External links

http://www.ibm.com/blogs/psirt/security-bulletin-ibm-aspera-faspex-4-4-2-has-addressed-multiple-security-vulnerabilities/
http://www.cybersecurity-help.cz/dashboard/admin/vulnerabilities/advisories/detail.php?ADVISORY_ID=688314&SOURCE_ID=163


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Out-of-bounds read

EUVDB-ID: #VU56064

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-3712

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition when processing ASN.1 strings related to a confusion with NULL termination of strings in array. A remote attacker can pass specially crafted data to the application to trigger an out-of-bounds read error and read contents of memory on the system or perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Aspera Faspex for Windows: before 4.4.2

IBM Aspera Faspex for Linux: before 4.4.2

External links

http://www.ibm.com/blogs/psirt/security-bulletin-ibm-aspera-faspex-4-4-2-has-addressed-multiple-security-vulnerabilities/
http://www.cybersecurity-help.cz/dashboard/admin/vulnerabilities/advisories/detail.php?ADVISORY_ID=688314&SOURCE_ID=163


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Inconsistent interpretation of HTTP requests

EUVDB-ID: #VU56474

Risk: Medium

CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-33193

CWE-ID: CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')

Exploit availability: No

Description

The vulnerability allows a remote attacker to preform HTTP/2 request smuggling attacks.

The vulnerability exists due to improper validation of HTTP/2 requests in mod_proxy in Apache HTTP Server. A remote attacker can send a specially crafted HTTP/2 request to the server and smuggle arbitrary HTTP headers.

Successful exploitation of vulnerability may allow an attacker to poison web server cache and perform phishing attacks.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Aspera Faspex for Windows: before 4.4.2

IBM Aspera Faspex for Linux: before 4.4.2

External links

http://www.ibm.com/blogs/psirt/security-bulletin-ibm-aspera-faspex-4-4-2-has-addressed-multiple-security-vulnerabilities/
http://www.cybersecurity-help.cz/dashboard/admin/vulnerabilities/advisories/detail.php?ADVISORY_ID=688314&SOURCE_ID=163


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Out-of-bounds write

EUVDB-ID: #VU61284

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23943

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in mod_sed. A remote attacker can trigger out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Aspera Faspex for Windows: before 4.4.2

IBM Aspera Faspex for Linux: before 4.4.2

External links

http://www.ibm.com/blogs/psirt/security-bulletin-ibm-aspera-faspex-4-4-2-has-addressed-multiple-security-vulnerabilities/
http://www.cybersecurity-help.cz/dashboard/admin/vulnerabilities/advisories/detail.php?ADVISORY_ID=688314&SOURCE_ID=163


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Cryptographic issues

EUVDB-ID: #VU60166

Risk: Low

CVSSv3.1: 3.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-4160

CWE-ID: CWE-310 - Cryptographic Issues

Exploit availability: No

Description

The vulnerability allows a remote attacker to decrypt TLS traffic.

The vulnerability exists due to BN_mod_exp may produce incorrect results on MIPS. A remote attacker can decrypt TLS traffic. According to vendor, multiple EC algorithms are affected, including some of the TLS 1.3 default curves. 

Successful exploitation of the vulnerability requires certain pre-requisites for attack, such as obtaining and  reusing private keys. 

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Aspera Faspex for Windows: before 4.4.2

IBM Aspera Faspex for Linux: before 4.4.2

External links

http://www.ibm.com/blogs/psirt/security-bulletin-ibm-aspera-faspex-4-4-2-has-addressed-multiple-security-vulnerabilities/
http://www.cybersecurity-help.cz/dashboard/admin/vulnerabilities/advisories/detail.php?ADVISORY_ID=688314&SOURCE_ID=163


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) NULL pointer dereference

EUVDB-ID: #VU50740

Risk: Medium

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-23841

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the X509_issuer_and_serial_hash() function when parsing the issuer field in the X509 certificate. A remote attacker can supply a specially crafted certificate, trigger a NULL pointer dereference error and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Aspera Faspex for Windows: before 4.4.2

IBM Aspera Faspex for Linux: before 4.4.2

External links

http://www.ibm.com/blogs/psirt/security-bulletin-ibm-aspera-faspex-4-4-2-has-addressed-multiple-security-vulnerabilities/
http://www.cybersecurity-help.cz/dashboard/admin/vulnerabilities/advisories/detail.php?ADVISORY_ID=688314&SOURCE_ID=163


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Cryptographic issues

EUVDB-ID: #VU50744

Risk: Low

CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-23839

CWE-ID: CWE-310 - Cryptographic Issues

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a MitM attack.

The vulnerability exists due to a faulty implementation of the padding check when server is configured to support SSLv2 protocol. A remote attacker can perform a MitM attack and force the server to use less secure protocols.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Aspera Faspex for Windows: before 4.4.2

IBM Aspera Faspex for Linux: before 4.4.2

External links

http://www.ibm.com/blogs/psirt/security-bulletin-ibm-aspera-faspex-4-4-2-has-addressed-multiple-security-vulnerabilities/
http://www.cybersecurity-help.cz/dashboard/admin/vulnerabilities/advisories/detail.php?ADVISORY_ID=688314&SOURCE_ID=163


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Out-of-bounds read

EUVDB-ID: #VU30256

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-20838

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and X or R has more than one fixed quantifier, a related issue to CVE-2019-20454.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Aspera Faspex for Windows: before 4.4.2

IBM Aspera Faspex for Linux: before 4.4.2

External links

http://www.ibm.com/blogs/psirt/security-bulletin-ibm-aspera-faspex-4-4-2-has-addressed-multiple-security-vulnerabilities/
http://www.cybersecurity-help.cz/dashboard/admin/vulnerabilities/advisories/detail.php?ADVISORY_ID=688314&SOURCE_ID=163


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Cross-site scripting

EUVDB-ID: #VU58272

Risk: Medium

CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-41182

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of values passed as the `altField` option of the Datepicker widget. A remote attacker can inject and execute arbitrary JavaScript code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Aspera Faspex for Windows: before 4.4.2

IBM Aspera Faspex for Linux: before 4.4.2

External links

http://www.ibm.com/blogs/psirt/security-bulletin-ibm-aspera-faspex-4-4-2-has-addressed-multiple-security-vulnerabilities/
http://www.cybersecurity-help.cz/dashboard/admin/vulnerabilities/advisories/detail.php?ADVISORY_ID=688314&SOURCE_ID=163


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Cross-site scripting

EUVDB-ID: #VU58270

Risk: Medium

CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-41183

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data when processing values of various `*Text` options. A remote attacker can pass specially crafted input to the library and execute arbitrary JavaScript code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Aspera Faspex for Windows: before 4.4.2

IBM Aspera Faspex for Linux: before 4.4.2

External links

http://www.ibm.com/blogs/psirt/security-bulletin-ibm-aspera-faspex-4-4-2-has-addressed-multiple-security-vulnerabilities/
http://www.cybersecurity-help.cz/dashboard/admin/vulnerabilities/advisories/detail.php?ADVISORY_ID=688314&SOURCE_ID=163


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Cross-site scripting

EUVDB-ID: #VU58271

Risk: Medium

CVSSv3.1: 5.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2021-41184

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: Yes

Description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of values passed to the `of` option. A remote attacker can execute arbitrary JavaScript code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Aspera Faspex for Windows: before 4.4.2

IBM Aspera Faspex for Linux: before 4.4.2

External links

http://www.ibm.com/blogs/psirt/security-bulletin-ibm-aspera-faspex-4-4-2-has-addressed-multiple-security-vulnerabilities/
http://www.cybersecurity-help.cz/dashboard/admin/vulnerabilities/advisories/detail.php?ADVISORY_ID=688314&SOURCE_ID=163


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

15) Input validation error

EUVDB-ID: #VU61287

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-22719

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized value in r:parsebody. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Aspera Faspex for Windows: before 4.4.2

IBM Aspera Faspex for Linux: before 4.4.2

External links

http://www.ibm.com/blogs/psirt/security-bulletin-ibm-aspera-faspex-4-4-2-has-addressed-multiple-security-vulnerabilities/
http://www.cybersecurity-help.cz/dashboard/admin/vulnerabilities/advisories/detail.php?ADVISORY_ID=688314&SOURCE_ID=163


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) NULL pointer dereference

EUVDB-ID: #VU48896

Risk: Medium

CVSSv3.1: 5.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2020-1971

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trigger denial of service conditions via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Aspera Faspex for Windows: before 4.4.2

IBM Aspera Faspex for Linux: before 4.4.2

External links

http://www.ibm.com/blogs/psirt/security-bulletin-ibm-aspera-faspex-4-4-2-has-addressed-multiple-security-vulnerabilities/
http://www.cybersecurity-help.cz/dashboard/admin/vulnerabilities/advisories/detail.php?ADVISORY_ID=688314&SOURCE_ID=163


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

17) NULL pointer dereference

EUVDB-ID: #VU56681

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-34798

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error. A remote attacker can send a specially crafted HTTP request to the affected web server and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Aspera Faspex for Windows: before 4.4.2

IBM Aspera Faspex for Linux: before 4.4.2

External links

http://www.ibm.com/blogs/psirt/security-bulletin-ibm-aspera-faspex-4-4-2-has-addressed-multiple-security-vulnerabilities/
http://www.cybersecurity-help.cz/dashboard/admin/vulnerabilities/advisories/detail.php?ADVISORY_ID=688314&SOURCE_ID=163


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Buffer overflow

EUVDB-ID: #VU56679

Risk: Medium

CVSSv3.1: 4.9 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-39275

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system or perform a denial of service attack.

The vulnerability exists due to a boundary error within the ap_escape_quotes()  function. A remote attacker can send a specially crafted request to the web server, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system but requires that the Apache module passes untrusted data to the affected function.

According to vendor, No included modules pass untrusted data to these functions

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Aspera Faspex for Windows: before 4.4.2

IBM Aspera Faspex for Linux: before 4.4.2

External links

http://www.ibm.com/blogs/psirt/security-bulletin-ibm-aspera-faspex-4-4-2-has-addressed-multiple-security-vulnerabilities/
http://www.cybersecurity-help.cz/dashboard/admin/vulnerabilities/advisories/detail.php?ADVISORY_ID=688314&SOURCE_ID=163


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###