Lucene search

K
ibmIBMD3AC4B67CC05523F3C110270F1C10E1291276393582A3413624B6686059BBD2C
HistoryMar 11, 2024 - 2:37 p.m.

Security Bulletin: Due to the use of OpenTelemetry gRPC, IBM CICS TX Standard is vulnerable to an Denial of Service vulnerability (CVE-2023-47108).

2024-03-1114:37:52
www.ibm.com
7
opentelemetry
grpc
ibm cics tx standard
denial of service
cve-2023-47108
vulnerability
fix
upgrade
linux

6.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

37.1%

Summary

There is a vulnerability in OpenTelemetry gRPC package which is shipped as part of IBM CICS TX Standard. An update to IBM CICS TX Standard has been released to address the vulnerability.

Vulnerability Details

CVEID:CVE-2023-47108
**DESCRIPTION:**OpenTelemetry OpenTelemetry-Go Contrib is vulnerable to a denial of service, caused by an unbound cardinality metrics flaw in otelgrpc when the grpc Unary Server Interceptor out of the box adds labels net.peer.sock.addr and net.peer.sock.port. By sending a specially crafted request, a remote attacker could exploit this vulnerability to consume all available resources.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/272509 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM CICS TX Standard 11.1

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now by upgrading IBM CICS TX Standard.

Product Version Platform Remediation/Fix
IBM CICS TX Standard

11.1

| Linux|

Download the upgrade from Fix Central

Workarounds and Mitigations

None

CPENameOperatorVersion
cics txeq11.1

6.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

37.1%

Related for D3AC4B67CC05523F3C110270F1C10E1291276393582A3413624B6686059BBD2C