Lucene search

K
ibmIBM086B39C8EEA9E80F827A72EB837BB35072FC75FA2EFB8DDEC667E6F0D07BFC82
HistoryDec 21, 2021 - 4:32 p.m.

Security Bulletin: Log4j Vulnerability ( CVE-2021-44228 ) in IBM Informix Dynamic Server in Cloud Pak for Data

2021-12-2116:32:25
www.ibm.com
42
apache log4j
ibm informix
cloud pak for data
cve-2021-44228
vulnerability
remote code execution
log4shell
logjam
cvss
informix 4.0.1 upgrade

EPSS

0.967

Percentile

99.7%

Summary

This Security Alert addresses CVE-2021-44228, a vulnerability in Apache Log4j. Versions Affected: All Apache Log4j2 <=2.14.1 on IBM Informix Dynamic Server in Cloud Pak for Data

Vulnerability Details

CVEID:CVE-2021-44228
**DESCRIPTION:**Apache Log4j could allow a remote attacker to execute arbitrary code on the system, caused by the failure to protect against attacker controlled LDAP and other JNDI related endpoints by JNDI features. By sending a specially crafted code string, an attacker could exploit this vulnerability to load arbitrary Java code on the server and take complete control of the system. Note: The vulnerability is also called Log4Shell or LogJam.
CVSS Base score: 10
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/214921 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Informix Dynamic Server on Cloud Pak for Data All

Remediation/Fixes

None

Workarounds and Mitigations

IBM strongly recommends addressing the vulnerability now by executing these manual steps.

  1. Upgrade your Informix 4.0.0 deployments to 4.0.1
  2. Install the Informix operator version 4.0.1 (included in the CASE ibm-informix-operator-bundle-4.0.3.tgz)
  3. Navigate to the official documentation for the Informix CP4D service (<https://www.ibm.com/docs/en/cloud-paks/cp-data/4.0?topic=services-informix&gt;) and follow the steps in the “Upgrading Informix” to update any deployed Informix custom resource from 4.0.0 to 4.0.1