Lucene search

K
ibmIBMA25AF29A3FC77795C41CBCCD17A2CD42F44AF6509003535CBAC62F617EBBEAA8
HistoryJul 28, 2023 - 1:39 p.m.

Security Bulletin: GNOME libxml2 vulnerability affects IBM Safer Payments (CVE-2023-29469)

2023-07-2813:39:38
www.ibm.com
30
ibm safer payments
libxml2
vulnerability
pmml models
external queries
docx file
outgoing channel configurations
denial of service
update fix

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

46.5%

Summary

Libxml2 is used by IBM Safer Payments as part of PMML models, external queries, and docx file templates for Outgoing Channel Configurations. This vulnerability has been addressed.

Vulnerability Details

CVEID:CVE-2023-29469
**DESCRIPTION:**GNOME libxml2 is vulnerable to a denial of service, caused by a double free flaw in the xmlDictComputeFastKey function due to hashing empty strings are not null-terminated. By persuading a victim to open a specially crafted XML content, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 5.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/253143 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Safer Payments 6.1.0.00 and above, 6.2.0.00 and above, 6.3.0.00 - 6.3.1.04, 6.4.0.00 - 6.4.2.03, 6.5.0.00 - 6.5.0.01

Remediation/Fixes

Update IBM Safer Payments to version 6.3.1.05, 6.4.2.04, 6.5.0.02, or higher.

Refer to the IBM Safer Payments documentation to download the updates.

Workarounds and Mitigations

Do not use PMML models, external queries, and docx file templates for Outgoing Channel Configurations

Affected configurations

Vulners
Node
ibmsafer_paymentsMatch6.1
OR
ibmsafer_paymentsMatch6.2
OR
ibmsafer_paymentsMatch6.3
OR
ibmsafer_paymentsMatch6.4
OR
ibmsafer_paymentsMatch6.5

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

46.5%