IBM this week announced patches for high-severity vulnerabilities in IBM MQ, warning that attackers could exploit them to bypass security restrictions or access sensitive information.
IBM this week announced patches for high-severity vulnerabilities in IBM MQ, warning that attackers could exploit them to bypass security restrictions or access sensitive information.
Messaging and queuing middleware, IBM MQ provides enterprise-grade messaging between applications, enabling the transfer of data between programs and the sending of messages to multiple subscribers.
Two security issues were resolved in IBM MQ this week, both residing within the libcurl library. Both flaws can be exploited remotely, IBM notes in an advisory.
Tracked as CVE-2022-27780, the first of these bugs could allow an attacker to bypass security restrictions using a specially crafted host name in a URL.
The second vulnerability, CVE-2022-30115, exists because of a HSTS check bypass flaw and could be exploited to obtain sensitive information over clear-text HTTP.
IBM MQ versions 9.2 LTS, 9.1 LTS, 9.0 LTS, 9.2 CD, and 9.1 CD were found vulnerable. Both vulnerabilities were addressed under APAR IT40933.
This week, IBM also resolved a medium-severity information leak in the SANNav software used by IBM b-type SAN directors and switches, caused by improper encryption of data.
IBM also announced a fix for a high-severity denial-of-service (DoS) vulnerability in Sterling Connect:Direct for UNIX. Tracked as CVE-2022-25647, the bug impacts Google Gson and is caused by the deserialization of untrusted data.
According to IBM, a remote attacker could exploit this vulnerability by using the writeReplace() method. Sterling Connect:Direct for UNIX 6.2.0.4.iFix018 resolves the issue.
IBM has also updated several advisories detailing severe bugs in Security Guardium Key Lifecycle Manager (SKLM/GKLM), Sterling B2B Integrator, and Security Verify Governance (ISVG).
Further information on the resolved vulnerabilities can be found on IBM’s product security page.
By Ionut Arghire on Wed, 24 Aug 2022 11:58:02 +0000
Original link