Lucene search

K
ibmIBM4046D3A5014E80838D09083FE93F85445D9024B698CBF7D80036A1AF082D000D
HistoryJul 27, 2023 - 5:12 p.m.

Security Bulletin: IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data is vulnerable to a denial of service in OpenSSL (CVE-2022-4450)

2023-07-2717:12:19
www.ibm.com
10
ibm watson speech services
cloud pak for data
openssl
denial of service
vulnerability
upgrade

0.001 Low

EPSS

Percentile

46.6%

Summary

IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data is vulnerable to a denial of service in OpenSSL, caused by a double-free error related to the improper handling of specific PEM data by the PEM_read_bio_ex() function (CVE-2022-4450). OpenSSL is included in the Base OS image used by our Speech Services. This vulnerabilitiy has been addressed. Please read the details for remediation below.

Vulnerability Details

CVEID:CVE-2022-4450
**DESCRIPTION:**OpenSSL is vulnerable to a denial of service, caused by a double-free error related to the improper handling of specific PEM data by the PEM_read_bio_ex() function. By sending specially crafted PEM files for parsing, a remote attacker could exploit this vulnerability to cause the system to crash.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/246615 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data 4.0.0 - 4.7.0

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now by upgrading.

Product(s)|**Version(s)
**|Remediation/Fix/Instructions
β€”|β€”|β€”
IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data| 4.7.1| The fix in 4.7.1 applies to all versions listed (4.0.0-4.7.0). Version 4.7.1 can be downloaded and installed from: <https://www.ibm.com/docs/en/cloud-paks/cp-data/4.7.x&gt;[ttps://www.ibm.com/docs/en/cloud-paks/cp-data](&lt;https://www.ibm.com/docs/en/cloud-paks/cp-data/4.7.x&gt;)

Workarounds and Mitigations

None