Lucene search

K
ibmIBMDBB7E54BB099003C8F7B216174943587623C9DF36C0EEB969EB4E5CA53564946
HistoryNov 01, 2023 - 8:02 p.m.

Security Bulletin: IBM Storage Ceph is vulnerable to Improper Input Validation in Curl (CVE-2022-35252)

2023-11-0120:02:09
www.ibm.com
13
ibm storage ceph
improper input validation
curl
denial of service
vulnerability
cve-2022-35252
rhel
upgrade

6.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

50.6%

Summary

Curl is used by IBM Storage Ceph as part of RHEL, the base operating system. CVE-2022-35252

Vulnerability Details

CVEID:CVE-2022-35252
**DESCRIPTION:**cURL libcurl is vulnerable to a denial of service, caused by a flaw when cookies contain control codes are later sent back to an HTTP(S) server. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause a “sister site” to deny service to siblings.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/234980 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Storage Ceph <6.1
IBM Storage Ceph 5.3z1-z4

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now.
Download the latest version of IBM Storage Ceph and upgrade to 6.1 by following instructions.

<https://public.dhe.ibm.com/ibmdl/export/pub/storage/ceph/&gt;
<https://www.ibm.com/docs/en/storage-ceph/6?topic=upgrading&gt;

Workarounds and Mitigations

None