Lucene search

K
ibmIBM9812339E49C50429A2029C7593135E82DCC0B25985C484D6169893EB248E765B
HistoryFeb 19, 2024 - 8:15 a.m.

Security Bulletin: IBM Sterling Connect:Direct Web Services is vulnerable to denial of service due to FasterXML jackson-databind (CVE-2023-35116)

2024-02-1908:15:33
www.ibm.com
3
ibm sterling connect:direct
denial of service
fasterxml jackson-databind
cve-2023-35116
upgrade
version 6.1.0.23
version 6.2.0.22

6.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

8.6%

Summary

IBM Sterling Connect:Direct Web Services uses FasterXML jackson-databind. This bulletin identifies the steps to take to address the vulnerabilities.

Vulnerability Details

CVEID:CVE-2023-35116
**DESCRIPTION:**Fasterxml jackson-databind is vulnerable to a denial of service, caused by a stack-based overflow. By persuading a victim to open a specially crafted content, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 5.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/258157 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Sterling Connect:Direct Web Services 6.1.0
IBM Sterling Connect:Direct Web Services 6.2.0
IBM Sterling Connect:Direct Web Services 6.0

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now by upgrading …

Product(s)|Version(s)|**Remediation
**
—|—|—
IBM Sterling Connect:Direct Web Services| 6.1| Apply 6.1.0.23, available on Fix Central
IBM Sterling Connect:Direct Web Services| 6.2| Apply 6.2.0.22, available on Fix Central
IBM Sterling Connect:Direct Web Service| 6.0| Upgrade to 6.1.0.23 or 6.2.0.22

Workarounds and Mitigations

None

6.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

8.6%

Related for 9812339E49C50429A2029C7593135E82DCC0B25985C484D6169893EB248E765B