Lucene search

K
ibmIBM4530870EA1D99A77E8735B00435C94D1A32A9F087A32B298111C22150699B723
HistoryJun 28, 2023 - 7:33 p.m.

Security Bulletin: IBM MQ Appliance is affected by a denial of service vulnerability (CVE-2023-28513)

2023-06-2819:33:08
www.ibm.com
34
ibm mq appliance
denial of service
vulnerability
fix
it42945
9.2 lts
9.2 cd
9.3 lts
9.3 cd
cve-2023-28513
security update

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

57.6%

Summary

IBM MQ Appliance has resolved a denial of service vulnerability.

Vulnerability Details

CVEID:CVE-2023-28513
**DESCRIPTION:**IBM MQ, under certain configurations, is vulnerable to a denial of service attack caused by an error processing messages.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/250397 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM MQ Appliance 9.2 LTS
IBM MQ Appliance 9.2 CD
IBM MQ Appliance 9.3 LTS
IBM MQ Appliance 9.3 CD

Remediation/Fixes

This vulnerability is addressed under IT42945

IBM strongly recommends addressing the vulnerability now.

IBM MQ Appliance version 9.2 LTS

Apply IBM MQ Appliance 9.2.0.15 fix pack, or later firmware.

IBM MQ Appliance version 9.2 CD

Apply IBM MQ Appliance 9.2.5.8 cumulative security update, or later firmware.

IBM MQ Appliance version 9.3 LTS

Apply IBM MQ Appliance 9.3.0.6 cumulative security update, or later firmware.

IBM MQ Appliance version 9.3 CD

Apply IBM MQ Appliance 9.3.3 Continuous Delivery, or later firmware.

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmmq_applianceMatch9.2.0.0
OR
ibmmq_applianceMatch9.2.0.1
OR
ibmmq_applianceMatch9.2.0.2
OR
ibmmq_applianceMatch9.2.0.3
OR
ibmmq_applianceMatch9.2.0.4
OR
ibmmq_applianceMatch9.2.0.5
OR
ibmmq_applianceMatch9.2.0.6
OR
ibmmq_applianceMatch9.2.0.7
OR
ibmmq_applianceMatch9.2.0.8
OR
ibmmq_applianceMatch9.2.0.10
OR
ibmmq_applianceMatch9.2.0.11
OR
ibmmq_applianceMatch9.2.1
OR
ibmmq_applianceMatch9.2.2
OR
ibmmq_applianceMatch9.2.3
OR
ibmmq_applianceMatch9.2.4
OR
ibmmq_applianceMatch9.2.5
OR
ibmmq_applianceMatch9.2.5
OR
ibmmq_applianceMatch01
OR
ibmmq_applianceMatch9.2.5
OR
ibmmq_applianceMatch02
OR
ibmmq_applianceMatch9.2.5
OR
ibmmq_applianceMatch04
OR
ibmmq_applianceMatch9.2.5.6
OR
ibmmq_applianceMatch9.2.5.7
OR
ibmmq_applianceMatch9.3.0.0
OR
ibmmq_applianceMatch9.3.0.1
OR
ibmmq_applianceMatch9.3.0.2
OR
ibmmq_applianceMatch9.3.0.3
OR
ibmmq_applianceMatch9.3.0.4
OR
ibmmq_applianceMatch9.3.0.5
OR
ibmmq_applianceMatch9.3.1
OR
ibmmq_applianceMatch9.3.1.1
OR
ibmmq_applianceMatch9.3.2
OR
ibmmq_applianceMatch9.3.2.1
VendorProductVersionCPE
ibmmq_appliance9.2.0.0cpe:2.3:a:ibm:mq_appliance:9.2.0.0:*:*:*:*:*:*:*
ibmmq_appliance9.2.0.1cpe:2.3:a:ibm:mq_appliance:9.2.0.1:*:*:*:*:*:*:*
ibmmq_appliance9.2.0.2cpe:2.3:a:ibm:mq_appliance:9.2.0.2:*:*:*:*:*:*:*
ibmmq_appliance9.2.0.3cpe:2.3:a:ibm:mq_appliance:9.2.0.3:*:*:*:*:*:*:*
ibmmq_appliance9.2.0.4cpe:2.3:a:ibm:mq_appliance:9.2.0.4:*:*:*:*:*:*:*
ibmmq_appliance9.2.0.5cpe:2.3:a:ibm:mq_appliance:9.2.0.5:*:*:*:*:*:*:*
ibmmq_appliance9.2.0.6cpe:2.3:a:ibm:mq_appliance:9.2.0.6:*:*:*:*:*:*:*
ibmmq_appliance9.2.0.7cpe:2.3:a:ibm:mq_appliance:9.2.0.7:*:*:*:*:*:*:*
ibmmq_appliance9.2.0.8cpe:2.3:a:ibm:mq_appliance:9.2.0.8:*:*:*:*:*:*:*
ibmmq_appliance9.2.0.10cpe:2.3:a:ibm:mq_appliance:9.2.0.10:*:*:*:*:*:*:*
Rows per page:
1-10 of 311

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

57.6%

Related for 4530870EA1D99A77E8735B00435C94D1A32A9F087A32B298111C22150699B723