IBM Support

Security Bulletin: IBM MQ could leak sensitive information due to an error within the pre-v7 queue manager pubsub logic (CVE-2020-4319)

Security Bulletin


Summary

IBM MQ could allow under special circumstances, an authenticated user to obtain sensitive information due to a data leak from an error within the pre-v7 queue manager pubsub logic

Vulnerability Details

CVEID:   CVE-2020-4319
DESCRIPTION:   IBM MQ, IBM MQ Appliance, and IBM MQ for HPE NonStop 8.0, 9.1 LTS, and 9.1 CD could allow under special circumstances, an authenticated user to obtain sensitive information due to a data leak from an error within the pre-v7 queue manager pubsub logic. IBM X-Force ID: 177402.
CVSS Base score: 3.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/177402 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM MQ 9.1 CD
IBM MQ 9.1 LTS
IBM MQ 9.0 LTS
IBM MQ 8.0
IBM WebSphere MQ 7.5
IBM WebSphere MQ 7.1

Remediation/Fixes

IBM WebSphere MQ 7.1

Contact IBM Support and request a Fix for APAR IT31787

IBM WebSphere MQ 7.5

Contact IBM Support and request a Fix for APAR IT31787

IBM MQ 8.0

Apply Fixpack 8.0.0.15

IBM MQ 9.0 LTS

Apply Interim Fix for APAR IT31787

IBM MQ 9.1 LTS

Apply Fixpack 9.1.0.6

IBM MQ 9.1 CD

Upgrade to IBM MQ 9.1.5

Workarounds and Mitigations

Disable fastpath bindings for SVRCONN channel instances, for example by setting MQIBindType=STANDARD under the Channel stanza of the Queue Manager ini file.
Additionally, ensure that untrusted applications that attach locally to the queue manager do not use MQCNO_FASTPATH_BINDING.

Get Notified about Future Security Bulletins

References

Off

Change History

22 September 2020: Initial Publication
22 October 2020: Correct 9.0 iFix download link
09 November 2020: Add details about a workaround/mitigation.
11 November 2020: Corrected instructions in workaround/mitigation to specify MQIBindType=STANDARD to disable fastpath

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Product":{"code":"SSYHRD","label":"IBM MQ"},"Component":"Security","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF051","label":"Linux on IBM Z Systems"},{"code":"PF010","label":"HP-UX"},{"code":"PF027","label":"Solaris"},{"code":"PF033","label":"Windows"}],"Version":"7.1.0; 7.5.0; 8.0.0; 9.0.0; 9.1.0","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
12 November 2020

UID

ibm16335693