IBM Support

JR63217: SECURITY APAR

Subscribe to this APAR

By subscribing, you receive periodic emails alerting you to the status of the APAR, along with a link to the fix after it becomes available. You can track this item individually or track all items by product.

Notify me when this APAR changes.

Notify me when an APAR for this component changes.

 

APAR status

  • Closed as program error.

Error description

  • CVEID: CVE-2020-1971
    Description: The X.509 GeneralName type is a generic type for
    representing different types of names. One of those name types
    is known as EDIPartyName. OpenSSL provides a function
    GENERAL_NAME_cmp which compares different instances of a
    GENERAL_NAME to see if they are equal or not. This function
    behaves incorrectly when both GENERAL_NAMEs contain an
    EDIPARTYNAME. A NULL pointer dereference and a crash may occur
    leading to a possible denial of service attack. OpenSSL itself
    uses the GENERAL_NAME_cmp function for two purposes: 1)
    Comparing CRL distribution point names between an available CRL
    and a CRL distribution point embedded in an X509 certificate 2)
    When verifying that a timestamp response token signer matches
    the timestamp authority name (exposed via the API functions
    TS_RESP_verify_response and TS_RESP_verify_token) If an attacker
    can control both items being compared then that attacker could
    trigger a crash. For example if the attacker can trick a client
    or server into checking a malicious certificate against a
    malicious CRL then this may occur. Note that some applications
    automatically download CRLs based on a URL embedded in a
    certificate. This checking happens prior to the signatures on
    the certificate and CRL being verified. OpenSSL's s_server,
    s_client and verify tools have support for the "-crl_download"
    option which implements automatic CRL downloading and this
    attack has been demonstrated to work against those tools. Note
    that an unrelated bug means that affected versions of OpenSSL
    cannot parse or construct correct encodings of EDIPARTYNAME.
    However it is possible to construct a malformed EDIPARTYNAME
    that OpenSSL's parser will accept and hence trigger this attack.
    All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue.
    Other OpenSSL releases are out of support and have not been
    checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed
    in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).
    CVSS Base Score: 7.5
    CVSS Temporal Score:
    https://exchange.xforce.ibmcloud.com/vulnerabilities/192748 for
    more information
    CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
    
    CVEID: CVE-2020-8265
    Description: Node.js is vulnerable to a denial of service,
    caused by a use-after-free in TLSWrap within the TLS
    implementation. By writing to a TLS enabled socket, an attacker
    could exploit this vulnerability to corrupt memory and cause a
    denial of service.
    CVSS Base Score: 7.5
    CVSS Temporal Score:
    https://exchange.xforce.ibmcloud.com/vulnerabilities/194101 for
    more information
    CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
    
    CVEID: CVE-2020-8287
    Description: Node.js is vulnerable to HTTP request smuggling. By
    sending specially crafted HTTP request headers, an attacker
    could exploit this vulnerability to poison the web cache, bypass
    web application firewall protection, and conduct XSS attacks.
    CVSS Base Score: 7.4
    CVSS Temporal Score:
    https://exchange.xforce.ibmcloud.com/vulnerabilities/194100 for
    more information
    CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)
    
    CVEID: CVE-2021-3189
    Description: The slashify package 1.0.0 for Node.js allows
    open-redirect attacks, as demonstrated by a
    localhost:3000///example.com/ substring.
    CVSS Base Score: 7.4
    CVSS Temporal Score:
    https://exchange.xforce.ibmcloud.com/vulnerabilities/197154 for
    more information
    CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N)
    
    CVEID: CVE-2021-23840
    Description: Calls to EVP_CipherUpdate, EVP_EncryptUpdate and
    EVP_DecryptUpdate may overflow the output length argument in
    some cases where the input length is close to the maximum
    permissable length for an integer on the platform. In such cases
    the return value from the function call will be 1 (indicating
    success), but the output length value will be negative. This
    could cause applications to behave incorrectly or crash. OpenSSL
    versions 1.1.1i and below are affected by this issue. Users of
    these versions should upgrade to OpenSSL 1.1.1j. OpenSSL
    versions 1.0.2x and below are affected by this issue. However
    OpenSSL 1.0.2 is out of support and no longer receiving public
    updates. Premium support customers of OpenSSL 1.0.2 should
    upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed
    in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL
    1.0.2y (Affected 1.0.2-1.0.2x).
    CVSS Base Score: 7.5
    CVSS Temporal Score:
    https://exchange.xforce.ibmcloud.com/vulnerabilities/196848 for
    more information
    CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
    
    CVEID: CVE-2021-22884
    Description: Node.js is vulnerable to a denial of service,
    caused by an error when the whitelist includes
    "localhost6". By controlling the victim's DNS server
    or spoofing its responses, an attacker could exploit this
    vulnerability to bypass the DNS rebinding protection mechanism
    using the "localhost6" domain and cause a denial of
    service.
    CVSS Base Score: 6.5
    CVSS Temporal Score:
    https://exchange.xforce.ibmcloud.com/vulnerabilities/197191 for
    more information
    CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H)
    
    CVEID: CVE-2021-22883
    Description: Node.js is vulnerable to a denial of service,
    caused by a file descriptor leak. By making multiple attempts to
    connect with an 'unknownProtocol', an attacker could
    exploit this vulnerability to lead to an excessive memory usage
    and cause the system to run out of memory.
    CVSS Base Score: 7.5
    CVSS Temporal Score:
    https://exchange.xforce.ibmcloud.com/vulnerabilities/197190 for
    more information
    CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
    

Local fix

  • Use a text editor to modify the BPMConfig properties files. For
    more information, see "Configuration properties for the
    BPMConfig command"
    (https://www.ibm.com/support/knowledgecenter/SS8JB4/com.ibm.wbpm
    .ref.doc/topics/samplecfgprops.html).
    

Problem summary

  • No additional information is available.
    

Problem conclusion

  • A fix that updates the version of Node.js that is used in the
    Configuration editor will be available in a future release of
    Business Automation Workflow.
    

Temporary fix

Comments

APAR Information

  • APAR number

    JR63217

  • Reported component name

    BUS AUTO WORKFL

  • Reported component ID

    5737H4100

  • Reported release

    K00

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt / Xsystem

  • Submitted date

    2021-01-12

  • Closed date

    2021-03-25

  • Last modified date

    2021-03-25

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

Fix information

  • Fixed component name

    BUS AUTO WORKFL

  • Fixed component ID

    5737H4100

Applicable component levels

[{"Line of Business":{"code":"LOB45","label":"Automation"},"Business Unit":{"code":"BU029","label":"Software"},"Product":{"code":"SS8JB4","label":"IBM Business Automation Workflow"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"20.0.0.1"}]

Document Information

Modified date:
21 June 2021