Lucene search

K
ibmIBM1C1786F3BA8996071AB385BFDC4572F4247C792D5188A0C83F65E8CEDA006492
HistoryNov 22, 2022 - 1:50 p.m.

Security Bulletin: Rational Service Tester contains vulnerabilities which could affect Eclipse Jetty. Rational Service Tester has taken steps to mitigate these vulnerabilities.

2022-11-2213:50:54
www.ibm.com
16
rational service tester
eclipse jetty
denial of service
security bypass
update
vulnerability

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

51.1%

Summary

Eclipse Jetty contains a vulnerability around improper hostname input handling that could lead to failure in a proxy scenario, and a vulnerability that could lead to a potential denial of service attack.

Vulnerability Details

CVEID:CVE-2022-2191
**DESCRIPTION:**Eclipse Jetty is vulnerable to a denial of service, caused by a flaw with SslConnection does not release ByteBuffers from configured ByteBufferPool in case of error code paths. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/230671 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:CVE-2022-2047
**DESCRIPTION:**Eclipse Jetty could allow a remote authenticated attacker to bypass security restrictions, caused by a flaw in the HttpURI class. By sending a specially-crafted request, an attacker could exploit this vulnerability to the HttpClient and ProxyServlet/AsyncProxyServlet/AsyncMiddleManServlet wrongly interpreting an authority with no host as one with a host.
CVSS Base score: 2.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/230668 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N)

CVEID:CVE-2022-2048
**DESCRIPTION:**Eclipse Jetty is vulnerable to a denial of service, caused by a flaw in the error handling of an invalid HTTP/2 request. By sending specially-crafted HTTP/2 requests, a remote attacker could exploit this vulnerability to cause the server to become unresponsive, and results in a denial of service condition.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/230670 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
RST 9.2
RST 10.0
RST 9.5
RST 10.1
RST 10.2

Remediation/Fixes

Upgrading to Rational Service Tester version 10.5 is strongly recommended.

Product VRMF APAR Remediation/First Fix
RST 10.2 None <https://download4.boulder.ibm.com/sar/CMA/RAA/0atii/0/PSIRT58763_RPT-RST-ifix.zip&gt;
RST 10.1 None <https://download4.boulder.ibm.com/sar/CMA/RAA/0atii/0/PSIRT58763_RPT-RST-ifix.zip&gt;
RST 10.0 None <https://download4.boulder.ibm.com/sar/CMA/RAA/0atii/0/PSIRT58763_RPT-RST-ifix.zip&gt;
RST 9.5 None <https://download4.boulder.ibm.com/sar/CMA/RAA/0atii/0/PSIRT58763_RPT-RST-ifix.zip&gt;
RST 9.2 None <https://download4.boulder.ibm.com/sar/CMA/RAA/0atii/0/PSIRT58763_RPT-RST-ifix.zip&gt;

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmrational_performance_testerMatch9.2
OR
ibmrational_performance_testerMatch9.5
OR
ibmrational_performance_testerMatch10.0
OR
ibmrational_performance_testerMatch10.1
OR
ibmrational_performance_testerMatch10.2

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

51.1%