Lucene search

K
ibmIBM53FF141F4AC7B762B2389912E40F1D991725D29C03249C43651B372B0E7FA949
HistoryFeb 13, 2024 - 4:30 p.m.

Security Bulletin: Due to the use of curl, IBM CICS TX Advanced is vulnerable to security restrictions potentially being bypassed (CVE-2023-38546).

2024-02-1316:30:43
www.ibm.com
7
ibm cics tx advanced
vulnerability
security bypass
curl function
cve-2023-38546
update

6.7 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

34.2%

Summary

IBM CICS TX Advanced is vulnerable to CVE-2023-38546 if curl function, curl_easy_duphandle, has cookies enabled during the transfer when the handle is duplicated. Curl is used by IBM CICS TX Advancede to transfer data. An update to IBM CICS TX Advanced has been released to address this vulnerability.

Vulnerability Details

CVEID:CVE-2023-38546
**DESCRIPTION:**cURL libcurl could allow a remote attacker to bypass security restrictions, caused by a flaw in the curl_easy_duphandle function if a transfer has cookies enabled when the handle is duplicated. By sending a specially crafted request, an attacker could exploit this vulnerability to insert cookies at will into a running program.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/268046 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM CICS TX Advanced 10.1

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now by updating IBM CICS TX Advanced.

Product Version Platform Remediation/Fix
IBM CICS TX Advanced

10.1

| Linux|

Download the update from Fix Central.

Workarounds and Mitigations

None

CPENameOperatorVersion
cics txeq10.1