Lucene search

K
ibmIBM49453E1B08B541E7D0136DC203B64896F6913F90D1DD4FC4B642F3C700E3FADD
HistoryMar 15, 2024 - 2:29 a.m.

Security Bulletin: Vulnerabilities in Apache Commons Compress library affect Tivoli Netcool/OMNIbus WebGUI (CVE-2024-26308, CVE-2024-25710)

2024-03-1502:29:59
www.ibm.com
17
apache commons compress
tivoli netcool
omnibus webgui
denial of service
pack200
dump file
vulnerability
ibm
fix pack 34
cve-2024-26308
cve-2024-25710

8.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.9%

Summary

Apache Commons Compress library is used by Tivoli Netcool/OMNIbus WebGUI as part of Apache POI dependency for Seasonal Event Graphs export feature.

Vulnerability Details

CVEID:CVE-2024-26308
**DESCRIPTION:**Apache Commons Compress is vulnerable to a denial of service, caused by an out of memory error. By persuading a victim to open a specially crafted Pack200 file, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 5.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/283469 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)

CVEID:CVE-2024-25710
**DESCRIPTION:**Apache Commons Compress is vulnerable to a denial of service, caused by an infinite loop flaw. By persuading a victim to open a specially crafted DUMP file, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 5.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/283472 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Tivoli Netcool/OMNIbus_GUI 8.1.0 FP24 - FP33

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now.

Product VRMF APAR Remediation/First Fix
Tivoli Netcool/OMNIbus WebGUI 8.1.0 KT64884 Apply Fix Pack 34 (Fix Pack for WebGUI 8.1.0 Fix Pack 34)

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmtivoli_netcool\/omnibusMatch8.1.0
CPENameOperatorVersion
tivoli netcool/omnibuseq8.1.0

8.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.9%