Lucene search

K
ibmIBM2C1EE276E378B28575593302E16E47EC320E88EBA11E72E9E3A89A329F5186A9
HistoryDec 14, 2023 - 7:03 p.m.

Security Bulletin: IBM MQ Appliance is vulnerable to a denial of service (CVE-2023-4807)

2023-12-1419:03:22
www.ibm.com
19
ibm mq appliance
denial of service
vulnerability
openssl
avx512-ifma
apar it44589
firmware
fix pack
security update

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.8%

Summary

IBM MQ Appliance has resolved a denial of service vulnerability.

Vulnerability Details

CVEID:CVE-2023-4807
**DESCRIPTION:**OpenSSL is vulnerable to a denial of service, caused by a state corruption flaw in the POLY1305 MAC (message authentication code) implementation, when running on newer X86_64 processors supporting the AVX512-IFMA instructions. A local authenticated attacker could exploit this vulnerability to cause an incorrect result of some application dependent calculations or a crash or in some cases gain complete control of the application process.
CVSS Base score: 7.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/265578 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM MQ Appliance 9.2 LTS
IBM MQ Appliance 9.3 LTS
IBM MQ Appliance 9.3 CD

Remediation/Fixes

This vulnerability is addressed under APAR IT44589

IBM strongly recommends addressing the vulnerability now.

IBM MQ Appliance version 9.2 LTS

Upgrade to IBM MQ Appliance 9.3.0.15 fix pack, or later firmware.

IBM MQ Appliance version 9.3 LTS

Apply IBM MQ Appliance 9.3.0.15 fix pack, or later firmware.

IBM MQ Appliance version 9.3 CD

Apply IBM MQ Appliance 9.3.4.1 cumulative security update, or later firmware.

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmmq_applianceMatch9.2.0.0
OR
ibmmq_applianceMatch9.2.0.1
OR
ibmmq_applianceMatch9.2.0.2
OR
ibmmq_applianceMatch9.2.0.3
OR
ibmmq_applianceMatch9.2.0.4
OR
ibmmq_applianceMatch9.2.0.5
OR
ibmmq_applianceMatch9.2.0.6
OR
ibmmq_applianceMatch9.2.0.7
OR
ibmmq_applianceMatch9.2.0.8
OR
ibmmq_applianceMatch9.2.0.10
OR
ibmmq_applianceMatch9.2.0.11
OR
ibmmq_applianceMatch9.2.0.15
OR
ibmmq_applianceMatch9.2.0.16
OR
ibmmq_applianceMatch9.2.0.20
OR
ibmmq_applianceMatch9.3.0.0
OR
ibmmq_applianceMatch9.3.0.1
OR
ibmmq_applianceMatch9.3.0.2
OR
ibmmq_applianceMatch9.3.0.3
OR
ibmmq_applianceMatch9.3.0.4
OR
ibmmq_applianceMatch9.3.0.5
OR
ibmmq_applianceMatch9.3.0.6
OR
ibmmq_applianceMatch9.3.0.10
OR
ibmmq_applianceMatch9.3.0.11
OR
ibmmq_applianceMatch9.3.1.0
OR
ibmmq_applianceMatch9.3.1.1
OR
ibmmq_applianceMatch9.3.2
OR
ibmmq_applianceMatch0
OR
ibmmq_applianceMatch9.3.2.1
OR
ibmmq_applianceMatch9.3.3.0
OR
ibmmq_applianceMatch9.3.3.1
OR
ibmmq_applianceMatch9.3.4.0

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.8%