Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.4106 Security Bulletin: Vulnerabilities in Node.js affect IBM Integration Bus 3 December 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM Integration Bus Publisher: IBM Operating System: Linux variants Windows Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Create Arbitrary Files -- Existing Account Overwrite Arbitrary Files -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-37713 CVE-2021-37712 Reference: ESB-2021.4086 Original Bulletin: https://www.ibm.com/support/pages/node/6522970 https://www.ibm.com/support/pages/node/6522968 Comment: This bulletin contains two (2) IBM security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- Vulnerabilities in Node.js affect IBM Integration Bus v10 (CVE-2021-37713) Document Information Document number : 6522970 Modified date : 02 December 2021 Product : IBM Integration Bus Software version : - Operating system(s): Linux Windows Summary IBM Integration Bus ships with Node.js for which vulnerabilities were reported and have been addressed. Vulnerability details are listed below. Vulnerability Details CVEID: CVE-2021-37713 DESCRIPTION: Node.js tar module could allow a local attacker to execute arbitrary code on the system, caused by insufficient logic on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target. An attacker could exploit this vulnerability to create or overwrite arbitrary files and execute arbitrary code on the system. CVSS Base score: 8.2 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 208451 for the current score. CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N) Affected Products and Versions IBM Integration Bus V10 , V10.0.0.0 - V10.0.0.24 ( Linux on Intel x86-64 and Windows 64-bit only) Remediation/Fixes +--------------+--------------------+----------+-----------------------------+ | Product | VRMF |APAR | Remediation / Fix | +--------------+--------------------+----------+-----------------------------+ |IBM | | |Interim fix for APAR ( | |Integration |V10.0.0.0-V10.0.0.24|IT38593 |IT38593 ) is available from | |Bus | | | | | | | |IBM Fix Central | +--------------+--------------------+----------+-----------------------------+ Workarounds and Mitigations None Change History 01 Dec 2021: Initial Publication - -------------------------------------------------------------------------------------------- Vulnerabilities in Node.js affect IBM Integration Bus v10 (CVE-2021-37712) Document Information Document number : 6522968 Modified date : 02 December 2021 Product : IBM Integration Bus Software version : - Operating system(s): Linux Windows Summary IBM Integration Bus ships with Node.js for which vulnerabilities were reported and have been addressed. Vulnerability details are listed below. Vulnerability Details CVEID: CVE-2021-37712 DESCRIPTION: Node.js tar module could allow a local attacker to execute arbitrary code on the system, caused by an arbitrary file creation/overwrite vulnerability. By creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, an attacker could use an untrusted tar file to symlink into an arbitrary location and extract arbitrary files into that location to create or overwrite arbitrary files and execute arbitrary code on the system. CVSS Base score: 8.2 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 208450 for the current score. CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N) Affected Products and Versions IBM Integration Bus V10 , V10.0.0.0 - V10.0.0.24 ( Linux on Intel x86-64 and Windows 64-bit only) Remediation/Fixes +--------------+--------------------+----------+-----------------------------+ | Product | VRMF |APAR | Remediation / Fix | +--------------+--------------------+----------+-----------------------------+ |IBM | | |Interim fix for APAR ( | |Integration |V10.0.0.0-V10.0.0.24|IT38593 |IT38593 ) is available from | |Bus | | | | | | | |IBM Fix Central | +--------------+--------------------+----------+-----------------------------+ Workarounds and Mitigations None Change History 01 Dec 2021: Initial Publication - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYal99+NLKJtyKPYoAQhtkg//bIUzkzZDDkvTBSQtllAeYP1n8N/NPKqh vbO4OSzuYkcb8TQi/qnLaVkAkl0/SfDiu6aHctJ7+DIz6MAH49beGv94vGPWKM3P VhaEA4v/Dkgp6+pmuBJQYDvZTmFsb64yx5ox8F6Mg+goxFwOM6jAWQlJV2t/6sAX EFuqM2uezrpZcmVI+UCh+RG7q1z0rmAsfnskcEb7ybgPdZ/+2xllXlVBs9eo8Nqc kIkVHv80N7h3jHW11LdP0QdF42BkkQit7IVzB5/GeuMC/SfhUwW5nMJrz3aZfRyG pxglEBWvIBr6cRMfOOUsfudcDbbLsdzNmC3NZRAaZKyxYPKICV7iz9BO3x8dv2qj /IUSvv9kcBEqR40OVkcTVsH0jJQsw5jL+K1oxaTCURj0n5l7iTvExGsqR25xLuo8 TTGZ6MWxDkxoyj4F1Pf2nPo1NZccsqT74Y6hw/5qWaunJT4dXHpaNGaQP63DTT07 24s9QmTHVXn9l7nBHgXeEihOuGc2SfECoczFA9xSlgwealEblyeYJFvYx2iLTUSJ yLAsvSsT9kpd5xGoIVHPpCBycsNOBPJz2aEspCvzYEnW6uWKLdF/PXKRIcDKyX63 36ah4RM5Ba8xKcBbw2ykp7kPL3V5A7mhddQuo40p0qBlqpPindUCl3NoYzwDeq2Z t9oJo8+o3Gw= =PZmN -----END PGP SIGNATURE-----