CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
37.7%
Kerberos 5 and IBM MQ used by IBM MQ Operator and Queue Manager container images are vulnerable to denial of service due to improper memory allocation, and privilege escalation which may lead to bypassing security restrictions. This bulletin identifies the steps required to address these vulnerabilities.
**CVEID:**CVE-2024-40681 DESCRIPTION: IBM MQ could allow an authenticated user in a specifically defined role, to bypass security restrictions and execute actions against the queue manager.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/297613 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)
**CVEID:**CVE-2024-40680 DESCRIPTION: IBM MQ could allow a local user to cause a denial of service due to improper memory allocation causing a segmentation fault.
CVSS Base score: 6.2
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/297611 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
**CVEID:**CVE-2024-37371 DESCRIPTION: MIT Kerberos 5 (aka krb5) is vulnerable to a denial of service, caused by an invalid memory reads during GSS message token handling. By sending specially crafted message tokens, a remote authenticated attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/296013 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
**CVEID:**CVE-2024-37370 DESCRIPTION: MIT Kerberos 5 (aka krb5) could allow a remote attacker to bypass security restrictions, caused by improper access control. By sending a specially crafted request to modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, an attacker could exploit this vulnerability to cause the unwrapped token to appear truncated to the application.
CVSS Base score: 7.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/296012 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H)
Affected Product(s) | Version(s) |
---|---|
IBM MQ Operator | SC2 (formerly LTS): v3.2.0 - v3.2.3 |
CD: v3.0.0, v3.0.1, v3.1.0 - 3.1.3 LTS: v2.0.0 - 2.0.25 Other Release: v2.4.0 - v2.4.8, v2.3.0 - 2.3.3, v2.2.0 - v2.2.2 | |
IBM supplied MQ Advanced container images | CD: 9.4.0.0-r1, 9.4.0.0-r2, 9.4.0.0-r3, 9.3.4.0-r1, 9.3.4.1-r1,9.3.5.0-r1,9.3.5.0-r2,9.3.5.1-r1, 9.3.5.1-r2 |
LTS: 9.2.0.1-r1-eus, 9.2.0.2-r1-eus, 9.2.0.2-r2-eus, 9.2.0.4-r1-eus, 9.2.0.5-r1-eus,
9.2.0.5-r2-eus, 9.2.0.5-r3-eus, 9.2.0.6-r1-eus, 9.2.0.6-r2-eus, 9.2.0.6-r3-eus, 9.2.3.0-r1,
9.2.4.0-r1, 9.2.5.0-r1, 9.2.5.0-r2, 9.2.5.0-r3, 9.3.0.0-r1, 9.3.0.0-r2, 9.3.0.0-r3, 9.3.0.1-r1,
9.3.0.1-r2, 9.3.0.1-r3, 9.3.0.1-r4, 9.3.0.3-r1, 9.3.0.4-r1, 9.3.0.4-r2, 9.3.0.5-r1, 9.3.0.5-r2,
9.3.0.5-r3, 9.3.0.6-r1, 9.3.0.10-r1, 9.3.0.10-r2, 9.3.0.11-r1,9.3.0.11-r2, 9.3.0.15-r1, 9.3.0.16-r1, 9.3.0.16-r2, 9.3.0.17-r1, 9.3.0.17-r2, 9.3.0.17-r3, 9.3.0.20-r1, 9.3.0.20-r2
Other Release: 9.2.0.1-r1-eus, 9.2.0.2-r1-eus, 9.2.0.2-r2-eus, 9.2.0.4-r1-eus, 9.2.0.5-r1-eus, 9.2.0.5-r2-eus, 9.2.0.5-r3-eus, 9.2.0.6-r1-eus, 9.2.0.6-r2-eus, 9.2.0.6-r3-eus, 9.2.3.0-r1, 9.2.4.0-r1, 9.2.5.0-r1, 9.2.5.0-r2, 9.2.5.0-r3, 9.3.0.0-r1, 9.3.0.0-r2, 9.3.0.0-r3, 9.3.0.1-r1, 9.3.0.1-r2, 9.3.0.1-r3, 9.3.0.1-r4, 9.3.0.3-r1, 9.3.0.4-r1, 9.3.0.4-r2, 9.3.0.5-r1, 9.3.0.5-r2, 9.3.0.5-r3, 9.3.0.6-r1, 9.3.1.0-r1, 9.3.1.0-r2, 9.3.1.0-r3, 9.3.1.1-r1, 9.3.2.0-r1, 9.3.2.0-r2, 9.3.2.1-r1, 9.3.2.1-r2, 9.3.3.0-r1, 9.3.3.0-r2, 9.3.3.1-r1, 9.3.3.1-r2, 9.3.3.2-r1, 9.3.3.2-r2, 9.3.3.2-r3, ,9.3.3.3-r1, 9.3.3.3-r2
Issues mentioned by this security bulletin are addressed in -
IBM strongly recommends applying the latest container images.
Note:
IBM MQ Operator v3.2.4 CD and SC2 (formerly LTS) release details:
Image | Fix Version | Registry | Image Location |
---|---|---|---|
ibm-mq-operator | v3.2.4 | icr.io | cp.icr.io/cpopen/ibm-mq-operator@sha256:59fdf04acac4eb2d84e99c831796c63e14ce7ffe92076b8911a798b9da3b5d8a |
ibm-mqadvanced-server | 9.4.0.5-r1 | cp.icr.io | cp.icr.io/cp/ibm-mqadvanced-server@sha256:bdf741222bb8d40218ef9f391da4123be4d91dc040092463d44328e7c155fd93 |
ibm-mqadvanced-server-integration | 9.4.0.5-r1 | cp.icr.io | cp.icr.io/cp/ibm-mqadvanced-serv-integration@sha256:edbce5af3817d17da4e273b334b5f92f0627544b8417fbfef81adc6821af001f |
ibm-mqadvanced-server-dev | 9.4.0.5-r1 | icr.io | icr.io/ibm-messaging/ibm-mqadvanced-server-dev@sha256:16545bba8847bf8417190f1f1386bf1d292637585cf69f145bac10fc0c80559a |
IBM MQ Operator V2.0.26 LTS release details:
Image | Fix Version | Registry | Image Location |
---|---|---|---|
ibm-mq-operator | v2.0.26 | icr.io | icr.io/cpopen/ibm-mq-operator@sha256:6f08d54dbe7e38ff9767b125787eff120a7ddb38c3acc5f72d739fb23be7c853 |
ibm-mqadvanced-server | 9.3.0.21-r1 | cp.icr.io | cp.icr.io/cp/ibm-mqadvanced-server@sha256:e41f97c23607bfab39e0160e2f1e9927d5f203c4851dee29fb6ee27893f79cdc |
ibm-mqadvanced-server-integration | 9.3.0.21-r1 | cp.icr.io | cp.icr.io/cp/ibm-mqadvanced-server-integration@sha256:a851f5491d3230b25c8866f8311751fdb29f2ff8ca43e022b7542e0905d29ee9 |
ibm-mqadvanced-server-dev | 9.3.0.21-r1 | icr.io | icr.io/ibm-messaging/ibm-mqadvanced-server-dev@sha256:26c301ce7036c2b6c20a9ac6cf720170822d558dc76894c5bb6d78ccdb9e53f8 |
None
Vendor | Product | Version | CPE |
---|---|---|---|
ibm | mq_certified_container | 3.2.4 | cpe:2.3:a:ibm:mq_certified_container:3.2.4:*:*:*:lts:*:*:* |
ibm | mq_certified_container | 2.0.26 | cpe:2.3:a:ibm:mq_certified_container:2.0.26:*:*:*:lts:*:*:* |
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
37.7%