IBM on Monday announced patches for multiple high-severity vulnerabilities impacting products such as Netezza for Cloud Pak for Data, Voice Gateway, and SiteProtector.
A total of three vulnerabilities were resolved in IBM Netezza for Cloud Pak for Data, all of which impact the Golang packages that the platform uses. Two of these issues are rated ‘high severity’, with a CVSS score of 7.5.
All three flaws are described as denial-of-service (DoS) vulnerabilities in Golang that could be exploited remotely using specially crafted content or requests.
The bugs impact Netezza for Cloud Pak for Data versions 220.127.116.11 to 18.104.22.168 and have been addressed with the release of version 22.214.171.124 of the platform.
IBM also announced patches for five Node.js vulnerabilities that impact Voice Gateway, including two rated ‘high severity’, and which could lead to privilege escalation or arbitrary code execution.
The first of the bugs is a DLL search order hijacking in providers.dll, which could allow an attacker to elevate their privileges on the system using a specially crafted file.
The second issue exists because Node.js doesn’t properly check if an IP address is invalid. An attacker able to control the victim’s DNS server or spoof its responses could exploit the issue to execute arbitrary code.
Rated ‘medium severity’, the three remaining vulnerabilities are HTTP request smuggling flaws that could lead to cross-site scripting (XSS) attacks, web cache poisoning, or firewall protection bypass.
The bugs impact Voice Gateway 1.0.7, 126.96.36.199, and 1.0.8. IBM released new Voice Gateway 1.0.8.x images that contain fixes for all five issues.
IBM also patched six vulnerabilities in the SiteProtector system, all of which impact the Apache HTTP Server. The most severe of these is a high-severity request smuggling bug.
The issues impact IBM Security SiteProtector system version 3.1.1 and have been addressed with the release of version 188.8.131.52 of the appliance.
This week, IBM also patched a medium-severity identity spoofing flaw in Liberty for Java for IBM Cloud. The company also updated a series of previously published advisories, including a May advisory detailing the impact of the Spring4Shell vulnerability on IBM Cloud Pak System.
Additional information on the addressed vulnerabilities can be found on IBM’s support portal.
Related: Cisco Patches Critical Vulnerability in Email Security Appliance
Related: Owl Labs Patches Severe Vulnerability in Video Conferencing Devices`
Related: Critical U-Boot Vulnerability Allows Rooting of Embedded Systems