Lucene search

K
ibmIBMC737ABA5478ACA44BEC86B9DCC541442F6F617447459A42CAB9BEDC7BF89075E
HistoryJul 31, 2024 - 1:39 p.m.

Security Bulletin: IBM App Connect Enterprise Certified Container DesignerAuthoring operands that use mapping assistance are vulnerable to denial of service [CVE-2024-31580] [CVE-2024-31583]

2024-07-3113:39:52
www.ibm.com
4
ibm app connect enterprise
pytorch
denial of service
vulnerability
patch
upgrade
documentation

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

Summary

PyTorch is used by the mapping assistance code in IBM App Connect Enterprise Certified Container. IBM App Connect Enterprise Certified Container DesignerAuthoring operands that use mapping assistance are vulnerable to denial of service. This bulletin provides patch information to address the reported vulnerability in PyTorch. [CVE-2024-31580] [CVE-2024-31583]

Vulnerability Details

CVEID:CVE-2024-31580
**DESCRIPTION:**PyTorch is vulnerable to a denial of service, caused by a heap-based buffer overflow in the /runtime/vararg_functions.cpp component. By sending a specially crafted input, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/288181 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:CVE-2024-31583
**DESCRIPTION:**PyTorch is vulnerable to a denial of service, caused by a use-after-free flaw in the torch/csrc/jit/mobile/interpreter.cpp component. By persuading a victim to open a specially crafted content, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 5.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/288183 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
App Connect Enterprise Certified Container 5.0-lts
App Connect Enterprise Certified Container 7.0
App Connect Enterprise Certified Container 7.1
App Connect Enterprise Certified Container 7.2
App Connect Enterprise Certified Container 8.0
App Connect Enterprise Certified Container 8.1
App Connect Enterprise Certified Container 8.2
App Connect Enterprise Certified Container 9.0
App Connect Enterprise Certified Container 9.1
App Connect Enterprise Certified Container 9.2
App Connect Enterprise Certified Container 10.0
App Connect Enterprise Certified Container 10.1
App Connect Enterprise Certified Container 11.0
App Connect Enterprise Certified Container 11.1
App Connect Enterprise Certified Container 11.2
App Connect Enterprise Certified Container 11.3
App Connect Enterprise Certified Container 11.4
App Connect Enterprise Certified Container 11.5

Remediation/Fixes

IBM strongly suggests the following:
App Connect Enterprise Certified Container up to 11.6.0 (Continuous Delivery)

Upgrade to App Connect Enterprise Certified Container Operator version 11.6.0 or higher, and ensure that all DesignerAuthoring components are at 12.0.12.2-r1 or higher. Documentation on the upgrade process is available at <https://www.ibm.com/docs/en/app-connect/containers_cd?topic=releases-upgrading-operator&gt;

App Connect Enterprise Certified Container 5.0 LTS (Long Term Support)

Upgrade to App Connect Enterprise Certified Container Operator version 5.0.18 or higher, and ensure that all DesignerAuthoring components are at 12.0.12.2-r1-lts or higher. Documentation on the upgrade process is available at <https://www.ibm.com/docs/en/app-connect-contlts?topic=releases-upgrading-operator&gt;

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmapp_connect_enterpriseMatch5.0
OR
ibmapp_connect_enterpriseMatch7.1
OR
ibmapp_connect_enterpriseMatch7.2
OR
ibmapp_connect_enterpriseMatch8.0
OR
ibmapp_connect_enterpriseMatch8.1
OR
ibmapp_connect_enterpriseMatch8.2
OR
ibmapp_connect_enterpriseMatch9.0
OR
ibmapp_connect_enterpriseMatch9.1
OR
ibmapp_connect_enterpriseMatch9.2
OR
ibmapp_connect_enterpriseMatch10.0
OR
ibmapp_connect_enterpriseMatch10.1
OR
ibmapp_connect_enterpriseMatch11.0
OR
ibmapp_connect_enterpriseMatch11.1
OR
ibmapp_connect_enterpriseMatch11.2
OR
ibmapp_connect_enterpriseMatch11.3
OR
ibmapp_connect_enterpriseMatch11.4
OR
ibmapp_connect_enterpriseMatch11.5
VendorProductVersionCPE
ibmapp_connect_enterprise5.0cpe:2.3:a:ibm:app_connect_enterprise:5.0:*:*:*:*:*:*:*
ibmapp_connect_enterprise7.1cpe:2.3:a:ibm:app_connect_enterprise:7.1:*:*:*:*:*:*:*
ibmapp_connect_enterprise7.2cpe:2.3:a:ibm:app_connect_enterprise:7.2:*:*:*:*:*:*:*
ibmapp_connect_enterprise8.0cpe:2.3:a:ibm:app_connect_enterprise:8.0:*:*:*:*:*:*:*
ibmapp_connect_enterprise8.1cpe:2.3:a:ibm:app_connect_enterprise:8.1:*:*:*:*:*:*:*
ibmapp_connect_enterprise8.2cpe:2.3:a:ibm:app_connect_enterprise:8.2:*:*:*:*:*:*:*
ibmapp_connect_enterprise9.0cpe:2.3:a:ibm:app_connect_enterprise:9.0:*:*:*:*:*:*:*
ibmapp_connect_enterprise9.1cpe:2.3:a:ibm:app_connect_enterprise:9.1:*:*:*:*:*:*:*
ibmapp_connect_enterprise9.2cpe:2.3:a:ibm:app_connect_enterprise:9.2:*:*:*:*:*:*:*
ibmapp_connect_enterprise10.0cpe:2.3:a:ibm:app_connect_enterprise:10.0:*:*:*:*:*:*:*
Rows per page:
1-10 of 171

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

Related for C737ABA5478ACA44BEC86B9DCC541442F6F617447459A42CAB9BEDC7BF89075E