Security Bulletin
Summary
A vulnerability has been identified in SnakeYAML used by IBM Dependency Based BUild. SnakeYAML is used to load local YAML property files and is unlikely to cause a DoS incident described in the Vulnerability Details below. However, IBM recommends upgrading to version 1.1.0 or later.
Vulnerability Details
CVEID: CVE-2017-18640
DESCRIPTION: SnakeYAML is vulnerable to a denial of service, caused by an entity expansion in Alias feature during a load operation. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause the application to crash.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/174331 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Affected Products and Versions
Affected Product(s) | Version(s) |
Dependency Based Build (DBB) | 1.0.9 and earlier |
Remediation/Fixes
Upgrade the IBM Dependency Based Build toolkit to IBM Dependency Based Build 1.1.0. IBM Dependency Based Build toollkit can be obtained via Shopz.
Workarounds and Mitigations
Upgrade the IBM Dependency Based Build toolkit to IBM Dependency Based Build 1.1.0 or replace the snakeyaml-1.23.jar with snakeyaml-1.26.jar.
Get Notified about Future Security Bulletins
References
Change History
08 Feb 2021: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
17 February 2021
UID
ibm16413413