Lucene search

K
ibmIBM3905FC0C4618744A5C8C3957FE74292C1C8EDB2FBAB2EAFE7CD983CA2ADB5173
HistoryJul 22, 2024 - 3:17 p.m.

Security Bulletin: Security vulnerabilities may affect Go packages that are shipped with IBM CICS TX Standard.

2024-07-2215:17:15
www.ibm.com
6
ibm cics tx standard
go packages
vulnerabilities
denial of service
cve-2024-24786
cve-2023-45288
protocol buffers
golang go
memory exhaustion
http/2 protocol

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.4

Confidence

Low

Summary

Security vulnerabilities may affect Go packages that are shipped with IBM CICS TX Standard. IBM CICS TX Standard has addressed the issues.

Vulnerability Details

CVEID:CVE-2024-24786
**DESCRIPTION:**Protocol Buffers protobuf-go is vulnerable to a denial of service, caused by an infinite loop flaw in the rotojson.Unmarshal function when unmarshaling certain forms of invalid JSON. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/285337 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:CVE-2023-45288
**DESCRIPTION:**Golang Go is vulnerable to a denial of service, caused by a memory exhaustion flaw due to flood of CONTINUATION frames in the HTTP/2 protocol stack in the net/http and x/net/http2 packages. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/286962 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM CICS TX Standard 11.1

Remediation/Fixes

IBM strongly recommends addressing the vulnerabilities now by upgrading IBM CICS TX Standard.

Product Version Platform Remediation/Fix
IBM CICS TX Standard

11.1

| Linux|

Download the upgrade from Fix Central

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmcics_txMatch11.1

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.4

Confidence

Low

Related for 3905FC0C4618744A5C8C3957FE74292C1C8EDB2FBAB2EAFE7CD983CA2ADB5173