SB2022110929 - Out-of-bounds read in IBM App Connect Enterprise Certified Container
Published: November 9, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Out-of-bounds read (CVE-ID: CVE-2022-28615)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the ap_strcmp_match() function when processing an extremely large input buffer. A remote attacker can send a specially crafted HTTP request to the web server, trigger an out-of-bounds read error and read contents of memory on the system.
Note, the code distributed with the Apache HTTP Server cannot be coerced into such a call. The vulnerability can affect third-party modules or lua scripts that use ap_strcmp_match().
Remediation
Install update from vendor's website.
References
- https://www.ibm.com/blogs/psirt/security-bulletin-ibm-app-connect-enterprise-certified-container-designerauthoring-operands-that-use-mapping-assistance-may-be-vulnerable-to-loss-of-confidentiality-due-to-cve-2022-28615/"
- https://www.ibm.com/blogs/psirt/security-bulletin-ibm-app-connect-enterprise-certified-container-designerauthoring-operands-that-use-mapping-assistance-may-be-vulnerable-to-loss-of-confidentiality-due-to-cve-2022-28615/</a><br>
- https://www.ibm.com/support/pages/node/6837599<br><br></p>