Multiple vulnerabilities in IBM Security Verify Information Queue



Published: 2022-07-21
Risk High
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2019-2444
CVE-2019-2619
CVE-2017-10321
CVE-2017-10202
CWE-ID CWE-20
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
IBM Security Verify Information Queue
Other software / Other software solutions

Vendor IBM Corporation

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU65640

Risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-2444

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to compromise Core RDBMS.

The vulnerability exists due to insufficient validation of user-supplied input. A local user with Local Logon privilege can trick the victim into opening a specially crafted file and compromise Core RDBMS.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Security Verify Information Queue: 10.0.2

External links

http://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-verify-information-queue-uses-an-oracle-jdbc-jar-with-multiple-vulnerabilities-cve-2019-2444-cve-2019-2619-cve-2017-10321-cve-2017-10202/
http://www.ibm.com/support/pages/node/6605873


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Input validation error

EUVDB-ID: #VU65645

Risk: Low

CVSSv3.1: 5.8 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-2619

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to compromise Portable Clusterware.

The vulnerability exists in the Portable Clusterware component of Oracle Database Server. A local user with Grid Infrastructure User privilege can pass specially crafted input to the application and compromise Portable Clusterware.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Security Verify Information Queue: 10.0.2

External links

http://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-verify-information-queue-uses-an-oracle-jdbc-jar-with-multiple-vulnerabilities-cve-2019-2444-cve-2019-2619-cve-2017-10321-cve-2017-10202/
http://www.ibm.com/support/pages/node/6605873


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Input validation error

EUVDB-ID: #VU65646

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-10321

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to compromise Core RDBMS.

The vulnerability exists in the Core RDBMS component of Oracle Database Server. A local user with Create session privileges can pass specially crafted input to the application and compromise Core RDBMS.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Security Verify Information Queue: 10.0.2

External links

http://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-verify-information-queue-uses-an-oracle-jdbc-jar-with-multiple-vulnerabilities-cve-2019-2444-cve-2019-2619-cve-2017-10321-cve-2017-10202/
http://www.ibm.com/support/pages/node/6605873


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Input validation error

EUVDB-ID: #VU65647

Risk: High

CVSSv3.1: 8.6 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-10202

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote user to compromise OJVM

The vulnerability exists in the OJVM component of Oracle Database Server. A remote user with Create Session and Create Procedure privileges can pass specially crafted input to the application and compromise OJVM

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Security Verify Information Queue: 10.0.2

External links

http://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-verify-information-queue-uses-an-oracle-jdbc-jar-with-multiple-vulnerabilities-cve-2019-2444-cve-2019-2619-cve-2017-10321-cve-2017-10202/
http://www.ibm.com/support/pages/node/6605873


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###