Lucene search

K
ibmIBM64FBA4C5B17FD777E9FA9257B9E90CE5906AB5ECF43CE0DFC273E5494EEABFDB
HistoryJul 31, 2024 - 10:49 p.m.

Security Bulletin: Vulnerabilities in Golang Go affect IBM Cloud Pak System

2024-07-3122:49:15
www.ibm.com
11
vulnerabilities
golang go
ibm cloud pak system
cve-2023-45284
cve-2023-45283
upgrade
fix
intel
ibm fix central

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7.3

Confidence

Low

Summary

Vulnerabilities in Golang Go affect IBM Cloud Pak System. [CVE-2023-45284, CVE-2023-45283]

Vulnerability Details

CVEID:CVE-2023-45284
**DESCRIPTION:**Golang Go could provide weaker than expected security, caused by the failure to correctly detect reserved device names in some cases by the IsLocal function in the filepath package. An attacker could exploit this vulnerability to report “COM1”, and reserved names “COM” and “LPT” followed by superscript 1, 2, or 3 as local.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/270989 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVEID:CVE-2023-45283
**DESCRIPTION:**Golang Go could allow a remote attacker to traverse directories on the system, caused by the failure to recognize paths with a ??\ prefix as a Root Local Device path prefix in the filepath and safefilepath package. An attacker could send a specially crafted URL request containing “dot dot” sequences (/…/) to view arbitrary files on the system.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/270990 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

Affected Product(s)|**Version(s) (Intel)
**
—|—
IBM Cloud Pak System| 2.3.3.0
IBM Cloud Pak System| 2.3.3.3, 2.3.3.3 ifix1
IBM Cloud Pak System| 2.3.3.4
IBM Cloud Pak System| 2.3.3.5
IBM Cloud Pak System| 2.3.3.6, 2.3.3.6 ifix1, 2.3.3.6 ifix2

Remediation/Fixes

For unsupported versions the recommendation is to upgrade to supported version of the product.
This security bulletin applies to Cloud Pak System, Cloud Pak System Software, Cloud Pak System Software Suite.
IBM recommendation for customers is to apply the fix as reported below as soon as practical.

For Cloud Pak System
Upgrade to Cloud Pak System v2.3.4.0 for Intel at IBM Fix Central

Information on upgrading here <http://www.ibm.com/support/docview.wss?uid=ibm10887959&gt;

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmcloud_pak_systemMatch2.3.3
VendorProductVersionCPE
ibmcloud_pak_system2.3.3cpe:2.3:a:ibm:cloud_pak_system:2.3.3:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7.3

Confidence

Low

Related for 64FBA4C5B17FD777E9FA9257B9E90CE5906AB5ECF43CE0DFC273E5494EEABFDB