SB2025020509 - Multiple vulnerabilities in IBM watsonx Assistant for IBM Cloud Pak for Data
Published: February 5, 2025 Updated: February 7, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) UNIX symbolic link following (CVE-ID: CVE-2024-35235)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a symlink following issue. A local user can create a specially crafted symbolic link to a critical file on the system and make it world-writable.
Successful exploitation of this vulnerability may result in privilege escalation.
2) Missing Authorization (CVE-ID: CVE-2024-47176)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to missing authorization. A remote attacker can introduce a malicious printer to the system by sending specially crafted packets to port 631/UDP and then execute arbitrary OS commands on the system when a print job is started.
3) Input validation error (CVE-ID: CVE-2024-47076)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to cfGetPrinterAttributes5 does not sanitize IPP attributes returned from an IPP server. A remote attacker can provide controlled data to the rest of the CUPS system.
4) Command Injection (CVE-ID: CVE-2024-47177)
The vulnerability allows a remote attacker to execute arbitrary commands on the target system.
The vulnerability exists due to improper input validation in FoomaticRIPCommandLine. A remote unauthenticated attacker can use a specially crafted PPD file and execute arbitrary commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
5) Input validation error (CVE-ID: CVE-2024-47175)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to ppdCreatePPDFromIPP2 does not sanitize IPP attributes when creating the PPD buffer. A remote attacker can inject attacker-controlled data in the resulting PPD.
Remediation
Install update from vendor's website.