Lucene search

K
ibmIBM31BCAEA4ED22EB482685DEA448DCF6BF034E4C702A5B2F3E798DB9A8200FF289
HistoryJan 12, 2021 - 8:25 p.m.

Security Bulletin: IBM has announced a release for IBM Security Identity Governance and Intelligence in response to a security vulnerability (CVE-2019-11745)

2021-01-1220:25:53
www.ibm.com
21
ibm security igi
vulnerability fix
mozilla network security services
out-of-bounds write
remote attacker
cvss base score 8.8
igi 5.2
igi 5.2.1
igi 5.2.3
igi 5.2.3.3 if001

EPSS

0.003

Percentile

69.1%

Summary

IBM has announced a release for IBM Security Identity Governance and Intelligence (IGI) in response to security vulnerability. The vulnerability concerns Network Security Services Softoken Cryptographic Module that could allow an attacker to execute arbitrary code on the system or cause a denial of service.

Vulnerability Details

CVEID:CVE-2019-11745
**DESCRIPTION:**Mozilla Network Security Services (NSS), as used in Mozilla Firefox could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds write when encrypting with a block cipher. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to corrupt the heap and execute arbitrary code on the vulnerable system or cause a denial of service.
CVSS Base score: 8.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/172458 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Security Identity Governance and Intelligence 5.2
IBM Security Identity Governance and Intelligence 5.2.1
IBM Security Identity Governance and Intelligence 5.2.3

Remediation/Fixes

Product Name VRMF First Fix
IGI 5.2 5.2.3.3-ISS-SIGI-IF0001
IGI 5.2.1 5.2.3.3-ISS-SIGI-IF0001
IGI 5.2.3 5.2.3.3-ISS-SIGI-IF0001

For IGI V5.2 through 5.2.1: Upgrade to IGI 5.2.3.3 IF001
Users must upgrade to v5.2.3.3 IF001 of IBM Security Identity Governance and Intelligence (IGI) in order to obtain a fix for this vulnerability. If you require an individual fix, contact IBM Support.

Workarounds and Mitigations

None