IBM Support

Security Bulletin: IBM Sterling Connect:Direct for UNIX Container is vulnerable to execute arbitrary commands due to OpenSSL (CVE-2022-1292)

Security Bulletin


Summary

There is a vulnerability in the OpenSSL library used by IBM Sterling Connect:Direct for UNIX Container. IBM Sterling Connect:Direct for UNIX Container has addressed the applicable issue by upgrading OpenSSL to 1.1.1k.

Vulnerability Details

CVEID:   CVE-2022-1292
DESCRIPTION:   OpenSSL could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by improper validation of user-supplied input by the c_rehash script. By sending a specially-crafted request using shell metacharacters, an attacker could exploit this vulnerability to execute arbitrary commands with the privileges of the script on the system.
CVSS Base score: 6.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/225619 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)

Affected Products and Versions

Affected Product(s)Version(s)
IBM Sterling Connect:Direct for UNIX6.0.0
IBM Sterling Connect:Direct for UNIX6.1.0
IBM Sterling Connect:Direct for UNIX6.2.0

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now by upgrading

ProductVersionRemediation/Fix/Instructions
IBM Sterling Connect:Direct for UNIX6.2.0Apply Helm chart - 1.2.5, as per instructions.
IBM Sterling Connect:Direct for UNIX6.1.0Apply Helm chart - 1.2.5, as per instructions.
IBM Sterling Connect:Direct for UNIX6.0.0Apply Helm chart - 1.2.5, as per instructions.

 

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Change History

02 Sep 2022: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSKTYY","label":"Sterling Connect:Direct for UNIX"},"Component":"","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"6.2.0, 6.1.0, 6.0.0, 4.3.0","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}}]

Document Information

Modified date:
14 September 2022

Initial Publish date:
02 September 2022

UID

ibm16620285