Lucene search

K
ibmIBMCB2C87126C2521116C384B98344F2B8CB1EA87B8D2C0E2B0591DC24E65660EFE
HistoryMar 27, 2023 - 11:17 a.m.

Security Bulletin: IBM Sterling Connect:Express for UNIX is vulnerable to denial of service due to OpenSSL (CVE-2022-4450)

2023-03-2711:17:06
www.ibm.com
7

0.001 Low

EPSS

Percentile

46.6%

Summary

OpenSSL is used by IBM Sterling Connect:Express for UNIX. IBM Sterling Connect:Express for UNIX has addressed the applicable CVE.

Vulnerability Details

CVEID:CVE-2022-4450
**DESCRIPTION:**OpenSSL is vulnerable to a denial of service, caused by a double-free error related to the improper handling of specific PEM data by the PEM_read_bio_ex() function. By sending specially crafted PEM files for parsing, a remote attacker could exploit this vulnerability to cause the system to crash.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/246615 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Sterling Connect:Express for UNIX 1.5.x

Remediation/Fixes

Upgrade to 1.5.0.1611 or apply the OpenSSL 1.1.1t Updater for Connect:Express for Unix. Both are available on Fix Central.

Workarounds and Mitigations

None