Lucene search

K
ibmIBM58DF40BB3617B9F8FF7EDF5B4EACC6E58BCFD7A11318427D83C078A7705F4CBD
HistoryDec 30, 2022 - 5:31 p.m.

Security Bulletin: IBM Tivoli Monitoring is vulnerable to remote code execution [CVE-2022-40674]

2022-12-3017:31:59
www.ibm.com
16

0.006 Low

EPSS

Percentile

77.6%

Summary

The libexpart parser that is used by IBM Tivoli Monitoring for parsing various configuration xml files and parsing soap requests is potentially vulnerable to remote code execution [CVE-2022-40674].

Vulnerability Details

CVEID:CVE-2022-40674
**DESCRIPTION:**libexpat could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in the doContent function in xmlparse.c. An attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236116 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Tivoli Monitoring 6.3.0.7 Service Pack 12

Remediation/Fixes

IBM strongly suggests upgrading to the following: Fix VRMF Remediation/Fix
6.3.0.7-TIV-ITM-SP0013 6.3.0.7 IBM Tivoli Monitoring Service Pack 6.3.0.7-TIV-ITM-SP0013

Workarounds and Mitigations

None