IBM API Connect has addressed the following vulnerability.
CVEID:CVE-2020-15025
**DESCRIPTION:**NTP is vulnerable to a denial of service, caused by a memory leak when a CMAC key is used and associated with a CMAC algorithm in the ntp.keys file in ntpd. By sending specially-crafted packets, a remote authenticated attacker could exploit this vulnerability to consume all available memory resources.
CVSS Base score: 4.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/184004 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)
Affected Product(s) | Version(s) |
---|---|
API Connect | IBM API Connect V5.0.0.0-5.0.8.10 |
Affected Product
|
Addressed in VRMF
|
APAR
|
Remediation / First Fix
—|—|—|—
IBM API Connect
V5.0.0.0-5.0.8.10
|
5.0.8.11
| LI82046|
Addressed in IBM API Connect V5.0.8.11
Management server is impacted.
Follow this link and find the “Management” package:
http://www.ibm.com/support/fixcentral/swg/quickorder
Refer to 5.0.8.11 announce notes for important information on upgrade: <https://www.ibm.com/support/pages/node/6429049>
None