Lucene search

K
ibmIBMF280EFE73B11DF617737C17118445CB1DF461C4406955227F52BB5E7E2CAE33C
HistoryJul 22, 2024 - 12:48 p.m.

Security Bulletin: IBM Sterling Connect:Express for UNIX uses vulnerable version of OpenSSL

2024-07-2212:48:00
www.ibm.com
7
ibm sterling
connect:express
unix
openssl
upgrade
vulnerability
denial of service

AI Score

6.4

Confidence

High

Summary

IBM Sterling Connect:Express for UNIX uses a version OpenSSL which is vulnerable to denial of service (CVE-2024-2511). This issue has been addressed by upgrading the version of OpenSSL.

Vulnerability Details

CVEID:CVE-2024-2511
**DESCRIPTION:**OpenSSL is vulnerable to a denial of service, caused by improper server configuration validation. By using a specially crafted server configuration, a remote attacker could exploit this vulnerability to cause unbounded memory growth, and results in a denial of service condition.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/287215 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Sterling Connect:Express for UNIX 1.5.0.16190 and prior

Remediation/Fixes

Product(s) ** Version(s)** APAR Remediation/First Fix
IBM Sterling Connect:Express for UNIX 1.5.0.16190 and prior IT46525 Upgrade to 1.5.0.1700, available on Fix Central

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmsterling_connect\Matchexpress_for_unix1.5.0
VendorProductVersionCPE
ibmsterling_connect\express_for_unixcpe:2.3:a:ibm:sterling_connect\:express_for_unix:1.5.0:*:*:*:*:*:*:*