Lucene search

K
aixCentOS ProjectPYTHON_ADVISORY.ASC
HistoryJul 28, 2022 - 1:12 p.m.

AIX is affected by multiple vulnerabilities in Python

2022-07-2813:12:18
CentOS Project
aix.software.ibm.com
24

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.025 Low

EPSS

Percentile

89.9%

IBM SECURITY ADVISORY

First Issued: Thu Jul 28 13:12:18 CDT 2022

The most recent version of this document is available here:

http://aix.software.ibm.com/aix/efixes/security/python_advisory.asc
https://aix.software.ibm.com/aix/efixes/security/python_advisory.asc
ftp://aix.software.ibm.com/aix/efixes/security/python_advisory.asc

Security Bulletin: AIX is affected by multiple vulnerabilities in Python

===============================================================================

SUMMARY:

AIX is affected by multiple vulnerabilities due to Python. Python is
used by AIX as part of Ansible node management automation.

===============================================================================

VULNERABILITY DETAILS:

CVEID: CVE-2022-22827
    https://vulners.com/cve/CVE-2022-22827
    https://vulners.com/cve/CVE-2022-22827
DESCRIPTION: Expat could allow a remote attacker to execute arbitrary
    code on the system, caused by an integer overflow of storeAtts in
    xmlparse.c. By persuading a victim to open a specially-crafted file,
    an attacker could exploit this vulnerability to execute arbitrary
    code on the system.
CVSS Base Score: 7.8
CVSS Temporal Score: See
    https://exchange.xforce.ibmcloud.com/vulnerabilities/216901
    for the current score
CVSS Environmental Score*: Undefined
CVSS Vector:(CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)

CVEID: CVE-2022-25236
    https://vulners.com/cve/CVE-2022-25236
    https://vulners.com/cve/CVE-2022-25236
DESCRIPTION: libexpat is vulnerable to a denial of service, caused by
    improper protection against insertion of namesep characters into
    namespace URIs in xmlparse.c. By sending a specially-crafted request,
    a remote attacker could exploit this vulnerability to cause a denial
    of service condition.
CVSS Base Score: 5.3
CVSS Temporal Score: See
    https://exchange.xforce.ibmcloud.com/vulnerabilities/219784
    for the current score
CVSS Environmental Score*: Undefined
CVSS Vector:(CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2022-25235
    https://vulners.com/cve/CVE-2022-25235
    https://vulners.com/cve/CVE-2022-25235
DESCRIPTION: libexpat is vulnerable to a denial of service, caused by
    improper input validation in xmltok_impl.c. By persuading a victim to
    open a specially-crafted content with malformed encoding, a remote
    attacker could exploit this vulnerability to cause a denial of
    service condition.
CVSS Base Score: 3.3
CVSS Temporal Score: See
    https://exchange.xforce.ibmcloud.com/vulnerabilities/219782
    for the current score
CVSS Environmental Score*: Undefined
CVSS Vector:(CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)

CVEID: CVE-2022-25315
    https://vulners.com/cve/CVE-2022-25315
    https://vulners.com/cve/CVE-2022-25315
DESCRIPTION: libexpat could allow a remote attacker to execute arbitrary
    code on the system, caused by an integer overflow in storeRawNames.
    By persuading a victim to open a specially-crafted file, an attacker
    could overflow a buffer and execute arbitrary code on the system.
CVSS Base Score: 7.8
CVSS Temporal Score: See
    https://exchange.xforce.ibmcloud.com/vulnerabilities/219945
    for the current score
CVSS Environmental Score*: Undefined
CVSS Vector:(CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)

CVEID: CVE-2022-22824
    https://vulners.com/cve/CVE-2022-22824
    https://vulners.com/cve/CVE-2022-22824
DESCRIPTION: Expat could allow a remote attacker to execute arbitrary
    code on the system, caused by an integer overflow of defineAttribute
    in xmlparse.c. By persuading a victim to open a specially-crafted
    file, an attacker could exploit this vulnerability to execute
    arbitrary code on the system.
CVSS Base Score: 7.8
CVSS Temporal Score: See
    https://exchange.xforce.ibmcloud.com/vulnerabilities/216906
    for the current score
CVSS Environmental Score*: Undefined
CVSS Vector:(CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)

CVEID: CVE-2022-22825
    https://vulners.com/cve/CVE-2022-22825
    https://vulners.com/cve/CVE-2022-22825
DESCRIPTION: Expat could allow a remote attacker to execute arbitrary
    code on the system, caused by an integer overflow of lookup in
    xmlparse.c. By persuading a victim to open a specially-crafted file,
    an attacker could exploit this vulnerability to execute arbitrary
    code on the system.
CVSS Base Score: 7.8
CVSS Temporal Score: See
    https://exchange.xforce.ibmcloud.com/vulnerabilities/216905
    for the current score
CVSS Environmental Score*: Undefined
CVSS Vector:(CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)

CVEID: CVE-2022-22823
    https://vulners.com/cve/CVE-2022-22823
    https://vulners.com/cve/CVE-2022-22823
DESCRIPTION: Expat could allow a remote attacker to execute arbitrary
    code on the system, caused by an integer overflow of build_model in
    xmlparse.c. By persuading a victim to open a specially-crafted file,
    an attacker could exploit this vulnerability to execute arbitrary
    code on the system.
CVSS Base Score: 7.8
CVSS Temporal Score: See
    https://exchange.xforce.ibmcloud.com/vulnerabilities/216907
    for the current score
CVSS Environmental Score*: Undefined
CVSS Vector:(CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)

CVEID: CVE-2021-46143
    https://vulners.com/cve/CVE-2021-46143
    https://vulners.com/cve/CVE-2021-46143
DESCRIPTION: Expat could allow a remote attacker to execute arbitrary
    code on the system, caused by an integer overflow of m_groupSize in
    doProlog in xmlparse.c. By persuading a victim to open a
    specially-crafted file, an attacker could exploit this vulnerability
    to execute arbitrary code on the system.
CVSS Base Score: 7.8
CVSS Temporal Score: See
    https://exchange.xforce.ibmcloud.com/vulnerabilities/216875
    for the current score
CVSS Environmental Score*: Undefined
CVSS Vector:(CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)

CVEID: CVE-2022-23990
    https://vulners.com/cve/CVE-2022-23990
    https://vulners.com/cve/CVE-2022-23990
DESCRIPTION: Expat (aka libexpat) could allow a remote attacker to
    execute arbitrary code on the system, caused by an integer overflow
    in the doProlog function. By sending a specially-crafted request, an
    attacker could exploit this vulnerability to execute arbitrary code
    on the system.
CVSS Base Score: 9.8
CVSS Temporal Score: See
    https://exchange.xforce.ibmcloud.com/vulnerabilities/218206
    for the current score
CVSS Environmental Score*: Undefined
CVSS Vector:(CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID: CVE-2022-22826
    https://vulners.com/cve/CVE-2022-22826
    https://vulners.com/cve/CVE-2022-22826
DESCRIPTION: Expat could allow a remote attacker to execute arbitrary
    code on the system, caused by an integer overflow of nextScaffoldPart
    in xmlparse.c. By persuading a victim to open a specially-crafted
    file, an attacker could exploit this vulnerability to execute
    arbitrary code on the system.
CVSS Base Score: 7.8
CVSS Temporal Score: See
    https://exchange.xforce.ibmcloud.com/vulnerabilities/216904
    for the current score
CVSS Environmental Score*: Undefined
CVSS Vector:(CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)

CVEID: CVE-2022-25314
    https://vulners.com/cve/CVE-2022-25314
    https://vulners.com/cve/CVE-2022-25314
DESCRIPTION: libexpat could allow a remote attacker to execute arbitrary
    code on the system, caused by an integer overflow in the copyString
    function. By sending an overly-long argument, an attacker could
    overflow a buffer and execute arbitrary code on the system.
CVSS Base Score: 7.3
CVSS Temporal Score: See
    https://exchange.xforce.ibmcloud.com/vulnerabilities/219946
    for the current score
CVSS Environmental Score*: Undefined
CVSS Vector:(CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

CVEID: CVE-2022-25313
    https://vulners.com/cve/CVE-2022-25313
    https://vulners.com/cve/CVE-2022-25313
DESCRIPTION: libexpat is vulnerable to a denial of service, caused by
    stack exhaustion in build_model. By persuading a victim to open a
    specially-crafted file, a remote attacker could exploit this
    vulnerability using a large nesting depth in the DTD element to cause
    a denial of service.
CVSS Base Score: 5.5
CVSS Temporal Score: See
    https://exchange.xforce.ibmcloud.com/vulnerabilities/219947
    for the current score
CVSS Environmental Score*: Undefined
CVSS Vector:(CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)

CVEID: CVE-2022-23852
    https://vulners.com/cve/CVE-2022-23852
    https://vulners.com/cve/CVE-2022-23852
DESCRIPTION: Expat (aka libexpat) could allow a remote attacker to
    execute arbitrary code on the system, caused by an integer overflow
    in the XML_GetBuffer function. By sending a specially-crafted request,
    an attacker could exploit this vulnerability to execute arbitrary code
    on the system.
CVSS Base Score: 9.8
CVSS Temporal Score: See
    https://exchange.xforce.ibmcloud.com/vulnerabilities/218007
    for the current score
CVSS Environmental Score*: Undefined
CVSS Vector:(CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID: CVE-2021-45960
    https://vulners.com/cve/CVE-2021-45960
    https://vulners.com/cve/CVE-2021-45960
DESCRIPTION: Expat (aka libexpat) is vulnerable to a denial of service,
    caused by a realloc misbehavior issue in the storeAtts function in
    xmlparse.c. By persuading a victim to open a specially-crafted XML
    content, a remote attacker could exploit this vulnerability to cause
    a the application to crash.
CVSS Base Score: 5.5
CVSS Temporal Score: See
    https://exchange.xforce.ibmcloud.com/vulnerabilities/216473
    for the current score
CVSS Environmental Score*: Undefined
CVSS Vector:(CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)

CVEID: CVE-2022-22822
    https://vulners.com/cve/CVE-2022-22822
    https://vulners.com/cve/CVE-2022-22822
DESCRIPTION: Expat could allow a remote attacker to execute arbitrary code
    on the system, caused by an integer overflow of addBinding in
    xmlparse.c. By persuading a victim to open a specially-crafted file,
    an attacker could exploit this vulnerability to execute arbitrary code
    on the system.
CVSS Base Score: 7.8
CVSS Temporal Score: See
    https://exchange.xforce.ibmcloud.com/vulnerabilities/216908
    for the current score
CVSS Environmental Score*: Undefined
CVSS Vector:(CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)


AFFECTED PRODUCTS AND VERSIONS:

    AIX 7.3

    The following fileset levels are vulnerable:
    
    key_fileset = osrcaix

    Fileset          Lower Level   Upper Level    KEY
    ------------------------------------------------------
    python3.9.base   3.9.0.0       3.9.11.99      key_w_fs

    Note:
    A. Latest level of Python fileset is available from the web download site:
https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source=aixbp

    To find out whether the affected filesets are installed on your systems,
    refer to the lslpp command found in the AIX user's guide.

    Example:  lslpp -L | grep -i python3.9.base

REMEDIATION:

    FIXES

        IBM strongly recommends addressing the vulnerability now.

        A fix is available, and it can be downloaded from:

https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source=aixbp

        To extract the fixes from the tar file:

        zcat python-3.9.12.0.tar.Z | tar xvf -

        IMPORTANT: If possible, it is recommended that a mksysb backup
        of the system be created.  Verify it is both bootable and
        readable before proceeding.

        Note that all the previously reported security vulnerability fixes
        are also included in above mentioned fileset level.

        To preview the fix installation:

        installp -apYd . python3.9.base

        To install the fix package:

        installp -aXYd . python3.9.base
                    
        openssl dgst -sha256 -verify [pubkey_file] -signature [advisory_file].sig [advisory_file]

        openssl dgst -sha256 -verify [pubkey_file] -signature [ifix_file].sig [ifix_file]

        Published advisory OpenSSL signature file location:

        http://aix.software.ibm.com/aix/efixes/security/python_advisory.asc.sig
        https://aix.software.ibm.com/aix/efixes/security/python_advisory.asc.sig
        ftp://aix.software.ibm.com/aix/efixes/security/python_advisory.asc.sig 



WORKAROUNDS AND MITIGATIONS:

    None.

===============================================================================

CONTACT US:

Note: Keywords labeled as KEY in this document are used for parsing
purposes.

If you would like to receive AIX Security Advisories via email,
please visit "My Notifications":

    http://www.ibm.com/support/mynotifications
    https://www.ibm.com/support/mynotifications

To view previously issued advisories, please visit:

    http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq
    https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq

Contact IBM Support for questions related to this announcement:

    http://ibm.com/support/
    https://ibm.com/support/

To obtain the OpenSSL public key that can be used to verify the
signed advisories and ifixes:

    Download the key from our web page:

ftp://ftp.software.ibm.com/systems/power/AIX/systems_p_os_aix_security_pubkey.txt

Please contact your local IBM AIX support center for any
assistance.

REFERENCES:

Complete CVSS v3 Guide:
    http://www.first.org/cvss/user-guide
    https://www.first.org/cvss/user-guide
On-line Calculator v3:
    http://www.first.org/cvss/calculator/3.0
    https://www.first.org/cvss/calculator/3.0

RELATED INFORMATION:

Security Bulletin: AIX is affected by multiple vulnerabilities in Python
    https://www.ibm.com/support/pages/node/6607878

ACKNOWLEDGEMENTS:

None.

CHANGE HISTORY:

First Issued: Thu Jul 28 13:12:18 CDT 2022

===============================================================================

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer
According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an “industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.025 Low

EPSS

Percentile

89.9%