SB2022120214 - IBM App Connect Enterprise Certified Container update for fribidi
Published: December 2, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Heap-based buffer overflow (CVE-ID: CVE-2022-25309)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in fribidi_cap_rtl_to_unicode. A remote attacker can pass specially crafted data to the application, trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Input validation error (CVE-ID: CVE-2022-25310)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to improper handling of empty input when removing marks from unicode strings. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
Remediation
Install update from vendor's website.
References
- https://www.ibm.com/blogs/psirt/security-bulletin-ibm-app-connect-enterprise-certified-container-designerauthoring-operands-that-use-mapping-assistance-may-be-vulnerable-to-arbitrary-code-execution-due-to-cve-2022-25309/"
- https://www.ibm.com/blogs/psirt/security-bulletin-ibm-app-connect-enterprise-certified-container-designerauthoring-operands-that-use-mapping-assistance-may-be-vulnerable-to-arbitrary-code-execution-due-to-cve-2022-25309/</a></p><p>
- https://www.ibm.com/support/pages/node/6843931</p><p><br></p>
- https://www.ibm.com/support/pages/node/6843927