Lucene search

K
ibmIBMD783A7F4DFFB9905E79E357ACA80CE9623FFC55147AEC4BAF71DFFC0CC45C9F3
HistoryJul 30, 2021 - 5:06 a.m.

Security Bulletin: Multiple Vulnerabilities were detected in IBM Secure External Authentication Server

2021-07-3005:06:11
www.ibm.com
22

0.028 Low

EPSS

Percentile

90.7%

Summary

There are multiple vulnerabilities in IBM Secure External Authentication Server. IBM Secure External Authentication Server has addressed the applicable CVEs.

Vulnerability Details

CVEID:CVE-2021-29725
**DESCRIPTION:**IBM Sterling Secure Proxy could allow a remote user to consume resources causing a denial of service due to a resource leak.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/201102 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:CVE-2020-27218
**DESCRIPTION:**Eclipse Jetty could allow a remote attacker to bypass security restrictions, caused by a flaw when GZIP request body inflation is enabled. By sending a specially-crafted request, an attacker could exploit this vulnerability to inject data into the body of the subsequent request.
CVSS Base score: 4.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/192459 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)

CVEID:CVE-2020-27223
**DESCRIPTION:**Eclipse Jetty is vulnerable to a denial of service, caused by an error when handling a request containing multiple Accept headers with a large number of quality parameters. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to exhaust minutes of CPU time.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/197559 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:CVE-2020-13956
**DESCRIPTION:**Apache HttpClient could allow a remote attacker to bypass security restrictions, caused by the improper handling of malformed authority component in request URIs. By passing request URIs to the library as java.net.URI object, an attacker could exploit this vulnerability to pick the wrong target host for request execution.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/189572 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Secure External Authentication Server 6.0.2
IBM External Authentication Server 6.0.1
IBM Sterling External Authentication Server 2.4.3.2

Remediation/Fixes

Product

|

VRMF

|

iFix

|

Remediation/First Fix

—|—|—|—

IBM Secure External Authentication Server

|

6.0.2.0

|

iFix 2

|

Fix Central

IBM Secure External Authentication Server

|

6.0.1.1

|

iFix 4

|

Fix Central

IBM Sterling External Authentication Server

|

2.4.3.2

|

iFix 11

|

Fix Central

Workarounds and Mitigations

None