API Connect has addressed the following vulnerability.
Node.js tough-cookie module is vulnerable to a denial of service, caused by a regular expression error. By using a sufficiently large HTTP request Cookie header, a remote attacker could exploit this vulnerability to cause the application to consume an overly large amount of CPU resources.
CVEID:CVE-2016-1000232**
DESCRIPTION: *Node.js tough-cookie module is vulnerable to a denial of service, caused by a regular expression error. By using a sufficiently large HTTP request Cookie header, a remote attacker could exploit this vulnerability to cause the application to consume an overly large amount of CPU resources.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/119038 for the current score
CVSS Environmental Score: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Affected API Connect
|
Affected Versions
—|—
IBM API Connect| 5.0.6.0-5.0.6.5
IBM API Connect| 5.0.7.0-5.0.7.2
IBM API Connect| 5.0.8.0
Affected Product
|
Addressed in VRMF
|
APAR
|
Remediation / First Fix
—|—|—|—
IBM API Connect
5.0.0.0-5.0.6.5| 5.0.6.6| LI79986| Addressed in IBM API Connect V5.0.6.6.
Follow this link and find the “APIConnect_Management” package:
5.0.7.0-5.0.7.2| 5.0.8.1| LI79986| Addressed in IBM API Connect V5.0.8.1.
Follow this link and find the “APIConnect_Management” package:
5.0.8.0| 5.0.8.1| LI79986| Addressed in IBM API Connect V5.0.8.1.
Follow this link and find the “APIConnect_Management” package: