Lucene search

K
ibmIBM8A6E36115C04FA603CE238D12DEC2EFA3404AFBD19CA2B013D46C298F82648AF
HistoryJan 16, 2024 - 5:47 p.m.

Security Bulletin: IBM Sterling Connect:Direct for Microsoft Windows is vulnerable multiple issues due to IBM Runtime Environment Java Technology Edition

2024-01-1617:47:16
www.ibm.com
10
ibm sterling connect:direct
microsoft windows
java se
vulnerability
denial of service
upgrade

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

5.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.8%

Summary

IBM Sterling Connect:Direct for Microsoft Windows uses IBM Runtime Environment Java Technology Edition, Version 7 and 8.

Vulnerability Details

CVEID:CVE-2023-22081
**DESCRIPTION:**An unspecified vulnerability in Java SE related to the JSSE component could allow a remote attacker to cause no confidentiality impact, no integrity impact, and low availability impact.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/268929 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID:CVE-2023-5676
**DESCRIPTION:**Eclipse OpenJ9 is vulnerable to a denial of service, caused by a flaw when a shutdown signal (SIGTERM, SIGINT or SIGHUP) is received before the JVM has finished initializing. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause an infinite busy hang on a spinlock or a segmentation fault.
CVSS Base score: 4.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/271615 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Sterling Connect Direct for Microsoft Windows 6.0.0.0 - 6.0.0.4_iFix081
IBM Sterling Connect Direct for Microsoft Windows 6.1.0.0 - 6.1.0.2_iFix077
IBM Sterling Connect Direct for Microsoft Windows 6.2.0.0 - 6.2.0.6_iFix005
IBM Sterling Connect Direct for Microsoft Windows 6.3.0.0 - 6.3.0.2_iFix004

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now by upgrading.

Affected Product(s) Version(s) Remediation / Fix
IBM Sterling Connect:Direct for Microsoft Windows 6.0.0.0 - 6.0.0.4_iFix081 Apply 6.0.0.4_iFix082, available on Fix Central
IBM Sterling Connect:Direct for Microsoft Windows 6.1.0.0 - 6.1.0.2_iFix077 Apply 6.1.0.2_iFix078, available on Fix Central
IBM Sterling Connect:Direct for Microsoft Windows 6.2.0.0 - 6.2.0.6_iFix005 Apply 6.2.0.6_iFix0006, available on Fix Central
IBM Sterling Connect:Direct for Microsoft Windows 6.3.0.0 - 6.3.0.2_iFix004 Apply 6.3.0.2_iFix005, available on Fix Central

For unsupported versions IBM recommends upgrading to a fixed, supported version of the product.

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmsterling_connect\Matchdirect6.0windows
OR
ibmsterling_connect\Matchdirect6.1windows
OR
ibmsterling_connect\Matchdirect6.2windows
OR
ibmsterling_connect\Matchdirect6.3windows

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

5.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.8%