Lucene search

K
ibmIBM92EB7CEC4DDCB914290133ED886D12CD28500D1305EA84412480C6F0CD8A3D21
HistoryApr 26, 2024 - 11:06 a.m.

Security Bulletin: Vulnerability in BIND affects IBM Integrated Analytics System [CVE-2023-3341]

2024-04-2611:06:04
www.ibm.com
10
ibm integrated analytics system
vulnerability
bind
7.9.23.12.sp23
fix central

7.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

51.4%

Summary

Redhat provided BIND is used by IBM Integrated Analytics System. IBM Integrated Analytics System has addressed the applicable CVE [CVE-2023-3341]

Vulnerability Details

CVEID:CVE-2023-3341
**DESCRIPTION:**ISC BIND is vulnerable to a denial of service, caused by a stack exhaustion flaw in control channel code. By sending a specially crafted message over the control channel, a remote attacker could exploit this vulnerability to cause named to terminate.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/266515 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Integrated Analytics System 1.0.0-1.0.28.1

Remediation/Fixes

IBM has fixed the vulnerability in “7.9.23.12.SP23” security patch release. IBM strongly recommends addressing this vulnerability by upgrading to “7.9.23.12.SP23” or to the latest security patch release.

Affected Product(s) VRMF Remediation/Fixes
IBM Integrated Analytics System 7.9.23.12.SP23 Link to Fix Central

Workarounds and Mitigations

None

CPENameOperatorVersion
ibm integrated analytics systemeqany