IBM App Connect Enterprise Certified Container (ACEcc) Integration Server operands contain MQ Client code for communication with MQ. ACEcc Integration Server operands that use MQ Client nodes may be vulnerable to a denial of service attack. This bulletin provides patch information to address the reported vulnerability CVE-2021-38875.
CVEID:CVE-2021-38875
**DESCRIPTION:**IBM MQ 8.0, 9.0 LTS, 9.1 LTS, 9.2 LTS, 9.1 CD, and 9.2 CD is vulnerable to a denial of service attack caused by an error processing messages. IBM X-Force ID: 208398.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/208398 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
Affected Product(s) | Version(s) |
---|---|
App Connect Enterprise Certified Container | 1.1-eus with Operator |
App Connect Enterprise Certified Container | 1.4 with Operator |
App Connect Enterprise Certified Container | 1.5 with Operator |
App Connect Enterprise Certified Container | 2.0 with Operator |
App Connect Enterprise Certified Container | 2.1 with Operator |
App Connect Enterprise Certified Container | 3.0 with Operator |
App Connect Enterprise Certified Container 1.4, 1.5, 2.0, 2.1 and 3.0 (Continuous Delivery)
Upgrade to App Connect Enterprise Certified Container Operator version 3.1.0 or higher, and ensure that all DesignerAuthoring and IntegrationServer components are at 12.0.3.0-r1 or higher. Documentation on the upgrade process is available at <https://www.ibm.com/docs/en/app-connect/containers_cd?topic=releases-upgrading-operator>** **
App Connect Enterprise Certified Container 1.1 EUS (Extended Update Support)
Upgrade to App Connect Enterprise Certified Container Operator version 1.1.5 or higher, and ensure that all DesignerAuthoring and IntegrationServer components are at 11.0.0.15-r1-eus or higher. Documentation on the upgrade process is available at <https://www.ibm.com/docs/en/app-connect/containers_eus?topic=releases-upgrading-operator>
None