Lucene search

K
ibmIBMCE70464D0488D07C34814D7562F74EDC63E2319B5662ACCA328F9920D96AE8CC
HistoryJun 21, 2024 - 4:27 a.m.

Security Bulletin: Cryptography cipher update

2024-06-2104:27:10
www.ibm.com
3
cryptography
python
remote attack

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.0%

Summary

cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions Cipher.update_into would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as bytes) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since update_into was originally introduced in cryptography 1.8.

Vulnerability Details

CVEID:CVE-2023-23931
**DESCRIPTION:**PyPI cryptography package could allow a remote attacker to bypass security restrictions, caused by a memory corruption in Cipher.update_into. By passing an immutable python object as the outbuf, an attacker could exploit this vulnerability to bypass authentication and obtain access.
CVSS Base score: 4.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/246738 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)

Affected Products and Versions

Affected Product(s) Version(s)
PowerVC All

Remediation/Fixes

Update the python3-cryptography to v39.0.2

To apply the fix, please follow the steps mentioned on the links

PowerVC Version Fix link
2.1.1 https://www.ibm.com/support/fixcentral/swg/downloadFixes?parent=ibm%7EOther%20software&product=ibm/Other+software/PowerVC&release=2.1.1&platform=All&function=fixId&fixids=2.1.1-PowerVC-RHEL-SLES-NOARCH-APAR-IT45537&includeRequisites=1&includeSupersedes=0&downloadMethod=http
2.1.1.1 https://www.ibm.com/support/fixcentral/swg/downloadFixes?parent=ibm%7EOther%20software&product=ibm/Other+software/PowerVC&release=2.1.1.1&platform=All&function=fixId&fixids=2.1.1.1-PowerVC-RHEL-SLES-NOARCH-APAR-IT45572&includeRequisites=1&includeSupersedes=0&downloadMethod=http
2.2.0 https://www.ibm.com/support/fixcentral/swg/downloadFixes?parent=ibm%7EOther%20software&product=ibm/Other+software/PowerVC&release=2.2.0&platform=All&function=fixId&fixids=2.2.0-PowerVC-RHEL-SLES-NOARCH-APAR-IT45538&includeRequisites=1&includeSupersedes=0&downloadMethod=http

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmpowervcMatchanyexpress
CPENameOperatorVersion
powervceqany

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.0%