SB2022101031 - Multiple vulnerabilities in IBM QRadar DNS Analyzer App
Published: October 10, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Incorrect Regular Expression (CVE-ID: CVE-2022-31129)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper validation of user-supplied input when parsing overly long strings. A remote attacker can pass a string that contains more that 10k characters and perform regular expression denial of service (ReDoS) attack.
2) Path traversal (CVE-ID: CVE-2022-24785)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences within the npm version of Moment.js. A remote attacker can send a specially crafted HTTP request and read arbitrary files on the system.
3) Resource exhaustion (CVE-ID: CVE-2017-18214)
The vulnerability allows a remote unauthenticated attacker to cause DoS condition on the target system.The weakness exists due to resource exhaustion. A remote attacker can submit a specially crafted data string and cause the service to crash.
Remediation
Install update from vendor's website.
References
- https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-dns-analyzer-app-for-ibm-qradar-siem-is-vulnerable-to-using-components-with-known-vulnerabilities-cve-2022-31129-cve-2022-24785-cve-2017-18214/"
- https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-dns-analyzer-app-for-ibm-qradar-siem-is-vulnerable-to-using-components-with-known-vulnerabilities-cve-2022-31129-cve-2022-24785-cve-2017-18214/</a></p><p>
- https://www.ibm.com/support/pages/node/6827213</p><p><br></p>