nimbus-jose-jwt is used by IBM Sterling Connect:Direct for UNIX in file transfer. IBM Sterling Connect:Direct for UNIX is impacted by vulnerability in nimbus-jose-jwt. IBM Sterling Connect:Direct for UNIX has upgraded nimbus-jose-jwtto version 9.37.3 to address the issues.
CVEID:CVE-2023-52428
**DESCRIPTION:**Connect2id Nimbus-JOSE-JWT is vulnerable to a denial of service, caused by improper validation of user requests by the PasswordBasedDecrypter (PBKDF2) component. By sending a specially crafted request using a large JWE p2c header, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/284044 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Affected Product(s) | Version(s) |
---|---|
IBM Sterling Connect:Direct for UNIX | 6.2.0.0 - 6.2.0.7.iFix014 |
IBM Sterling Connect:Direct for UNIX | 6.3.0.0 - 6.3.0.2.iFix020 |
IBM strongly recommends addressing the vulnerability now by upgrading
Product | Version | Remediation/Fix/Instructions |
---|---|---|
IBM Sterling Connect:Direct for UNIX | 6.3.0 | Apply 6.3.0.2.iFix021, available on Fix Central. |
IBM Sterling Connect:Direct for UNIX | 6.2.0 | Apply 6.2.0.7.iFix015, available on Fix Central. |
None
Vendor | Product | Version | CPE |
---|---|---|---|
ibm | sterling_connect\ | direct_for_unix | cpe:2.3:a:ibm:sterling_connect\:direct_for_unix:6.3.0:*:*:*:*:*:*:* |
ibm | sterling_connect\ | direct_for_unix | cpe:2.3:a:ibm:sterling_connect\:direct_for_unix:6.2.0:*:*:*:*:*:*:* |