Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

IBM Patches Severe Vulnerabilities in MQ Messaging Middleware

IBM this week announced patches for high-severity vulnerabilities in IBM MQ, warning that attackers could exploit them to bypass security restrictions or access sensitive information.

IBM this week announced patches for high-severity vulnerabilities in IBM MQ, warning that attackers could exploit them to bypass security restrictions or access sensitive information.

Messaging and queuing middleware, IBM MQ provides enterprise-grade messaging between applications, enabling the transfer of data between programs and the sending of messages to multiple subscribers.

Two security issues were resolved in IBM MQ this week, both residing within the libcurl library. Both flaws can be exploited remotely, IBM notes in an advisory.

Tracked as CVE-2022-27780, the first of these bugs could allow an attacker to bypass security restrictions using a specially crafted host name in a URL.

The second vulnerability, CVE-2022-30115, exists because of a HSTS check bypass flaw and could be exploited to obtain sensitive information over clear-text HTTP.

IBM MQ versions 9.2 LTS, 9.1 LTS, 9.0 LTS, 9.2 CD, and 9.1 CD were found vulnerable. Both vulnerabilities were addressed under APAR IT40933.

This week, IBM also resolved a medium-severity information leak in the SANNav software used by IBM b-type SAN directors and switches, caused by improper encryption of data.

IBM also announced a fix for a high-severity denial-of-service (DoS) vulnerability in Sterling Connect:Direct for UNIX. Tracked as CVE-2022-25647, the bug impacts Google Gson and is caused by the deserialization of untrusted data.

According to IBM, a remote attacker could exploit this vulnerability by using the writeReplace() method. Sterling Connect:Direct for UNIX 6.2.0.4.iFix018 resolves the issue.

IBM has also updated several advisories detailing severe bugs in Security Guardium Key Lifecycle Manager (SKLM/GKLM), Sterling B2B Integrator, and Security Verify Governance (ISVG).

Further information on the resolved vulnerabilities can be found on IBM’s product security page.

Related: GitLab Patches Critical Remote Code Execution Vulnerability

Related: Cisco Squashes High-Severity Bug in Web Protection Solution

Related: Quarterly Security Patches Released for Splunk Enterprise

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Vulnerabilities

Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Vulnerabilities

Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.