Lucene search

K
ibmIBME11C25B9521F9D18B5DAAA5CC63105372502BC583ECE5890DE54698A26753E71
HistoryAug 31, 2023 - 11:59 p.m.

Security Bulletin: IBM MQ Appliance potentially vulnerable to a denial of service (CVE-2023-2650)

2023-08-3123:59:31
www.ibm.com
28
ibm mq appliance
openssl vulnerability
denial of service
it43897
firmware update

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

EPSS

0.003

Percentile

66.2%

Summary

IBM MQ Appliance has addressed a denial of service vulnerability.

Vulnerability Details

CVEID:CVE-2023-2650
**DESCRIPTION:**OpenSSL is vulnerable to a denial of service, caused by a flaw when using OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/256611 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM MQ Appliance 9.3 LTS
IBM MQ Appliance 9.2 LTS
IBM MQ Appliance 9.3 CD

Remediation/Fixes

This vulnerability is addressed under IT43897

IBM strongly recommends addressing the vulnerability now.

IBM MQ Appliance version 9.2 LTS

Apply IBM MQ Appliance 9.2.0.16 cumulative security update, or later firmware.

IBM MQ Appliance version 9.3 LTS

Apply IBM MQ Appliance 9.3.0.10 fix pack, or later firmware.

IBM MQ Appliance version 9.3 CD

Apply IBM MQ Appliance 9.3.3.1 cumulative security update, or later firmware.

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmmq_applianceMatch9.2.0.0
OR
ibmmq_applianceMatch9.2.0.1
OR
ibmmq_applianceMatch9.2.0.2
OR
ibmmq_applianceMatch9.2.0.3
OR
ibmmq_applianceMatch9.2.0.4
OR
ibmmq_applianceMatch9.2.0.5
OR
ibmmq_applianceMatch9.2.0.6
OR
ibmmq_applianceMatch9.2.0.7
OR
ibmmq_applianceMatch9.2.0.8
OR
ibmmq_applianceMatch9.2.0.10
OR
ibmmq_applianceMatch9.2.0.11
OR
ibmmq_applianceMatch9.2.0.15
OR
ibmmq_applianceMatch9.3.0.0
OR
ibmmq_applianceMatch9.3.0.1
OR
ibmmq_applianceMatch9.3.0.2
OR
ibmmq_applianceMatch9.3.0.3
OR
ibmmq_applianceMatch9.3.0.4
OR
ibmmq_applianceMatch9.3.0.5
OR
ibmmq_applianceMatch9.3.0.6
OR
ibmmq_applianceMatch9.3.1.0
OR
ibmmq_applianceMatch9.3.1.1
OR
ibmmq_applianceMatch9.3.2.0
OR
ibmmq_applianceMatch9.3.2.1
OR
ibmmq_applianceMatch9.3.3
VendorProductVersionCPE
ibmmq_appliance9.2.0.0cpe:2.3:a:ibm:mq_appliance:9.2.0.0:*:*:*:*:*:*:*
ibmmq_appliance9.2.0.1cpe:2.3:a:ibm:mq_appliance:9.2.0.1:*:*:*:*:*:*:*
ibmmq_appliance9.2.0.2cpe:2.3:a:ibm:mq_appliance:9.2.0.2:*:*:*:*:*:*:*
ibmmq_appliance9.2.0.3cpe:2.3:a:ibm:mq_appliance:9.2.0.3:*:*:*:*:*:*:*
ibmmq_appliance9.2.0.4cpe:2.3:a:ibm:mq_appliance:9.2.0.4:*:*:*:*:*:*:*
ibmmq_appliance9.2.0.5cpe:2.3:a:ibm:mq_appliance:9.2.0.5:*:*:*:*:*:*:*
ibmmq_appliance9.2.0.6cpe:2.3:a:ibm:mq_appliance:9.2.0.6:*:*:*:*:*:*:*
ibmmq_appliance9.2.0.7cpe:2.3:a:ibm:mq_appliance:9.2.0.7:*:*:*:*:*:*:*
ibmmq_appliance9.2.0.8cpe:2.3:a:ibm:mq_appliance:9.2.0.8:*:*:*:*:*:*:*
ibmmq_appliance9.2.0.10cpe:2.3:a:ibm:mq_appliance:9.2.0.10:*:*:*:*:*:*:*
Rows per page:
1-10 of 241

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

EPSS

0.003

Percentile

66.2%