First published: Tue Feb 22 2022(Updated: )
IBM Sterling Secure Proxy 6.0.3.0, 6.0.2.0, and 3.4.3.2 and IBM Sterling External Authentication Server are vulnerable a buffer overflow, due to the Jetty based GUI in the Secure Zone not properly validating the sizes of the form content and/or HTTP headers submitted. A local attacker positioned inside the Secure Zone could submit a specially crafted HTTP request to disrupt service. IBM X-Force ID: 219133.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling External Authentication Server | =3.4.3.2 | |
IBM Sterling External Authentication Server | =6.0.2.0 | |
IBM Sterling External Authentication Server | =6.0.3.0 | |
IBM Sterling Secure Proxy | =3.4.3.2 | |
IBM Sterling Secure Proxy | =6.0.2 | |
IBM Sterling Secure Proxy | =6.0.3.0 | |
IBM Sterling Secure Proxy | <=6.0.3 | |
IBM Sterling Secure Proxy | <=6.0.2 | |
IBM Sterling Secure Proxy | <=3.4.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-22333 is medium.
The affected software for CVE-2022-22333 is IBM Sterling Secure Proxy 6.0.3.0, 6.0.2.0, and 3.4.3.2 and IBM Sterling External Authentication Server.
CVE-2022-22333 allows a local attacker to exploit a buffer overflow vulnerability in the Jetty based GUI in the Secure Zone of IBM Sterling Secure Proxy and IBM Sterling External Authentication Server which could lead to unauthorized access, denial of service, or remote code execution.
Apply the available patches provided by IBM to fix CVE-2022-22333 in IBM Sterling Secure Proxy and IBM Sterling External Authentication Server.
Yes, you can find more information about CVE-2022-22333 on the IBM X-Force Exchange and IBM Support pages.