SB2022112248 - IBM Log Analysis update for SnakeYAML
Published: November 22, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Resource exhaustion (CVE-ID: CVE-2022-25857)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources when handling YAML files. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
2) Improper input validation (CVE-ID: CVE-2017-18640)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Application Server (SnakeYAML) component in PeopleSoft Enterprise PT PeopleTools. A remote non-authenticated attacker can exploit this vulnerability to perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-snakeyaml-used-by-logstash-affects-ibm-operations-analytics-log-analysis-cve-2022-25857-cve-2017-18640/"
- https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-snakeyaml-used-by-logstash-affects-ibm-operations-analytics-log-analysis-cve-2022-25857-cve-2017-18640/</a></p><p>
- https://www.ibm.com/support/pages/node/6840675</p><p><br></p>