Lucene search

K
ibmIBMBCC3853B1933FD3143B0B2A322EE20F83BD996615F2AB98C8E9B5C6E099CDA26
HistoryJul 08, 2022 - 7:22 a.m.

Security Bulletin: IBM MQ Operator and Queue manager container images are vulnerable to vulnerabilities from Golang Go and IBM WebSphere Application Server Liberty (CVE-2021-39293 and CVE-2021-39038)

2022-07-0807:22:42
www.ibm.com
17

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

44.4%

Summary

Vulnerabilities were identified in Golang Go and IBM WebSphere Application Server Liberty packages that were shipped with IBM MQ Operator and IBM supplied MQ Advanced container images.

Vulnerability Details

CVEID:CVE-2021-39293
**DESCRIPTION:**Golang Go is vulnerable to a denial of service, caused by a flaw in the NewReader and OpenReader functions in archive/zip. By sending a specially-crafted archive header, a remote attacker could exploit this vulnerability to cause a panic, which results in a denial of service.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/220196 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:CVE-2021-39038
**DESCRIPTION:**IBM WebSphere Application Server 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 22.0.0.2 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim’s click actions and possibly launch further attacks against the victim. IBM X-Force ID: 213968.
CVSS Base score: 4.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/213968 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM MQ Operator CD release 1.8.2
IBM MQ Operator EUS release 1.3.4
IBM Supplied MQ Advanced Queue Manager Container images 9.2.5.0-r3, 9.2.0.5-r2

Remediation/Fixes

Issues listed by this security bulletin are addressed in IBM MQ Operator 2.0.0 CD release that included IBM supplied MQ Advanced 9.3.0.0 container images and IBM MQ Operator 1.3.5 EUS release that included IBM supplied MQ Advanced 9.2.0.5 container images.

IBM MQ Operator 2.0.0 CD release details:

Image Fix Version Registry Image Location
ibm-mq-operator 2.0.0 icr.io icr.io/cpopen/ibm-mq-operator@sha256:f53b77d87d33467b7d439cc0392ad78c8e5d4d836ddd02c4dadd4f38fe4ce39f
ibm-mqadvanced-server 9.3.0.0-r1 cp.icr.io cp.icr.io/cp/ibm-mqadvanced-server@sha256:e9ad4295710088158163bedea4addf78dbfa245f4ec72b5e46655c5829ef4e78
ibm-mqadvanced-server-integration 9.3.0.0-r1 cp.icr.io cp.icr.io/cp/ibm-mqadvanced-server-integration@sha256:0639d6d84c18ec8c477e47c29f604725f07b47ea50f23e4eaffae4e440d75fed
ibm-mqadvanced-server-dev 9.3.0.0-r1 icr.io icr.io/ibm-messaging/mq@sha256:37aa67ad20656ab76303a70388da23be68e78a2de2bcec2e3106ccee2f7ab5e3

IBM MQ Operator 1.3.5 EUS release details:

Image Fix Version Registry Image Location
ibm-mq-operator 1.3.5 icr.io icr.io/cpopen/ibm-mq-operator@sha256:cd0d626b595e5f4fdcab72272820d0a9a7a4224b80c01c836e5fc9906494daeb
ibm-mqadvanced-server-integration 9.2.0.5-r3-eus cp.icr.io cp.icr.io/cp/ibm-mqadvanced-server-integration@sha256:0a6f3b378a4d14555ceb0df0d70424f7f36c10f6954f55e97c7f7d199f96c16c

Workarounds and Mitigations

None

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

44.4%