CNVD-2022-61911
Vulnerability from cnvd - Published: 2022-09-07
VLAI Severity ?
Title
IBM App Connect Enterprise拒绝服务漏洞
Description
IBM App Connect Enterprise是美国IBM公司的一个操作系统。IBM App Connect Enterprise 将现有业界信任的 IBM Integration Bus 技术与 IBM App Connect Professional 以及新的云本机技术进行了组合,提供一个可满足现代数字企业全面集成需求的平台。
IBM App Connect Enterprise Certified Container 4.2版本存在拒绝服务漏洞,该漏洞源于未对输入的错误消息做正确的处理,攻击者可利用该漏洞导致拒绝服务。
Severity
中
Patch Name
IBM App Connect Enterprise拒绝服务漏洞的补丁
Patch Description
IBM App Connect Enterprise是美国IBM公司的一个操作系统。IBM App Connect Enterprise 将现有业界信任的 IBM Integration Bus 技术与 IBM App Connect Professional 以及新的云本机技术进行了组合,提供一个可满足现代数字企业全面集成需求的平台。
IBM App Connect Enterprise Certified Container 4.2版本存在拒绝服务漏洞,该漏洞源于未对输入的错误消息做正确的处理,攻击者可利用该漏洞导致拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://www.ibm.com/support/pages/node/6601125
Reference
https://nvd.nist.gov/vuln/detail/CVE-2022-31770
Impacted products
| Name | IBM IBM App Connect Enterprise Certified Container 4.2 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2022-31770",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2022-31770"
}
},
"description": "IBM App Connect Enterprise\u662f\u7f8e\u56fdIBM\u516c\u53f8\u7684\u4e00\u4e2a\u64cd\u4f5c\u7cfb\u7edf\u3002IBM App Connect Enterprise \u5c06\u73b0\u6709\u4e1a\u754c\u4fe1\u4efb\u7684 IBM Integration Bus \u6280\u672f\u4e0e IBM App Connect Professional \u4ee5\u53ca\u65b0\u7684\u4e91\u672c\u673a\u6280\u672f\u8fdb\u884c\u4e86\u7ec4\u5408\uff0c\u63d0\u4f9b\u4e00\u4e2a\u53ef\u6ee1\u8db3\u73b0\u4ee3\u6570\u5b57\u4f01\u4e1a\u5168\u9762\u96c6\u6210\u9700\u6c42\u7684\u5e73\u53f0\u3002\n\nIBM App Connect Enterprise Certified Container 4.2\u7248\u672c\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u672a\u5bf9\u8f93\u5165\u7684\u9519\u8bef\u6d88\u606f\u505a\u6b63\u786e\u7684\u5904\u7406\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.ibm.com/support/pages/node/6601125",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2022-61911",
"openTime": "2022-09-07",
"patchDescription": "IBM App Connect Enterprise\u662f\u7f8e\u56fdIBM\u516c\u53f8\u7684\u4e00\u4e2a\u64cd\u4f5c\u7cfb\u7edf\u3002IBM App Connect Enterprise \u5c06\u73b0\u6709\u4e1a\u754c\u4fe1\u4efb\u7684 IBM Integration Bus \u6280\u672f\u4e0e IBM App Connect Professional \u4ee5\u53ca\u65b0\u7684\u4e91\u672c\u673a\u6280\u672f\u8fdb\u884c\u4e86\u7ec4\u5408\uff0c\u63d0\u4f9b\u4e00\u4e2a\u53ef\u6ee1\u8db3\u73b0\u4ee3\u6570\u5b57\u4f01\u4e1a\u5168\u9762\u96c6\u6210\u9700\u6c42\u7684\u5e73\u53f0\u3002\r\n\r\nIBM App Connect Enterprise Certified Container 4.2\u7248\u672c\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u672a\u5bf9\u8f93\u5165\u7684\u9519\u8bef\u6d88\u606f\u505a\u6b63\u786e\u7684\u5904\u7406\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "IBM App Connect Enterprise\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "IBM IBM App Connect Enterprise Certified Container 4.2"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2022-31770",
"serverity": "\u4e2d",
"submitTime": "2022-07-07",
"title": "IBM App Connect Enterprise\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…