Security Bulletin
Summary
Case Client component shipped with IBM Business Automation Workflow and IBM Case Manager is vulnerable to denial of service, caused by an error in the internal file name encoding algorithm with Apache Commons Compress. By persuading a victim to open specially crafted ZIP archive containing malicious input, a remote attacker could exploit this vulnerability to cause the application to enter into an infinite loop.
Vulnerability Details
Description: Apache Commons Compress is vulnerable to a denial of service, caused by an error in the internal file name encoding algorithm. By persuading a victim to open specially crafted ZIP archive containing malicious input, a remote attacker could exploit this vulnerability to cause the application to enter into an infinite loop.
CVSS Base Score: 4.3
CVSS Temporal Score: https://exchange.xforce.ibmcloud.com/vulnerabilities/165956 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)
Affected Products and Versions
Remediation/Fixes
The recommended solution is to apply the Interim Fix (iFix) or Cumulative Fix (CF) containing APAR PJ45804 as soon as practical:
· Upgrade to at least IBM Business Automation Workflow V18.0.0.1 as required by iFix and then apply iFix PJ45804
--OR--
· Apply cumulative fix Business Automation Workflow V19.0.0.3 (planned for end of Q4 2019)
· Upgrade to at least IBM 5.3.2 as required by iFix and then apply iFix that includes APAR PJ45804
--OR--
· Upgrade to Business Automation Workflow V19.0.0.3
Workarounds and Mitigations
a) Disable the Case Package feature in case client users, or limit the Case Package feature to administrative roles
b) Parse and disallow adding of document titles with special characters with IBM FileNet Content Platform Engine controls.
Get Notified about Future Security Bulletins
References
Change History
30 Dec 2019: initial version published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Internal Use Only
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
17 December 2019
UID
ibm11076955