Security Bulletin
Summary
IBM API Connect has addressed the following vulnerability.
Vulnerability Details
CVEID: CVE-2020-15106
DESCRIPTION: etcd is vulnerable to a denial of service, caused by improper data validation in the decodeRecord method. By sending a specially crafted data, a remote authenticated attacker could exploit this vulnerability to cause panic in decodeRecord method,
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/186329 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
CVEID: CVE-2020-15112
DESCRIPTION: etcd is vulnerable to a denial of service, caused by a flaw in the ReadAll method in wal/wal.go. By sending a specially crafted data, a remote authenticated attacker could exploit this vulnerability to cause a runtime panic.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/186328 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
CVEID: CVE-2020-15113
DESCRIPTION: etcd could allow a remote attacker to bypass security restrictions, caused by the lack of permission checks in the os.MkdirAll function when a given directory path exists already. By sending a specially crafted request, an attacker could exploit this vulnerability to bypass access restrictions.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/186327 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Affected Products and Versions
Affected Product(s) | Version(s) |
IBM API Connect | API Connect V10.0.1.0 |
IBM API Connect | V2018.4.1.0-2018.4.1.13 |
Remediation/Fixes
Affected Product | Addressed in VRMF | APAR | Remediation/First Fix |
IBM API Connect
V2018.4.1.0-2018.4.1.13
| 2018.4.1.15 |
LI81877 |
Addressed in IBM API Connect V2018.4.1.15. All components are impacted. Follow this link and find the packages.
|
IBM API Connect
V10.0.1.0
| 10.0.1.1 |
LI81877 |
Addressed in IBM API Connect V10.0.1.1 All components are impacted. Follow this link and find the packages.
|
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
References
Change History
February 2 2021: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
02 February 2021
UID
ibm16410854