Security Bulletin: IBM Sterling Connect:Direct for UNIX is vulnerable to denial of service due to nimbus-jose-jwt.
Discription

Summary nimbus-jose-jwt is used by IBM Sterling Connect:Direct for UNIX in file transfer. IBM Sterling Connect:Direct for UNIX is impacted by vulnerability in nimbus-jose-jwt. IBM Sterling Connect:Direct for UNIX has upgraded nimbus-jose-jwtto version 9.37.3 to address the issues. Vulnerability Details ** CVEID: CVE-2023-52428 DESCRIPTION: **Connect2id Nimbus-JOSE-JWT is vulnerable to a denial of service, caused by improper validation of user requests by the PasswordBasedDecrypter (PBKDF2) component. By sending a specially crafted request using a large JWE p2c header, a remote attacker could exploit this vulnerability to cause a denial of service. CVSS Base score: 7.5 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/284044 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) Affected Products and Versions Affected Product(s)| Version(s) —|— IBM Sterling Connect:Direct for UNIX| 6.2.0.0 – 6.2.0.7.iFix014 IBM Sterling Connect:Direct for UNIX| 6.3.0.0 – 6.3.0.2.iFix020 Remediation/Fixes IBM strongly recommends addressing the vulnerability now by upgrading Product| Version| Remediation/Fix/Instructions —|—|— IBM Sterling Connect:Direct for UNIX| 6.3.0| Apply 6.3.0.2.iFix021, available on Fix Central. IBM Sterling Connect:Direct for UNIX| 6.2.0| Apply 6.2.0.7.iFix015, available on Fix Central. Workarounds and Mitigations…Read More

Back to Main

Subscribe for the latest news: