CVE-2022-43928IBM DB2 Mirror FOR I vulnerability

3 documents3 sources
Severity
6.5MEDIUMNVD
CNA4.9
EPSS
0.1%
top 79.37%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 7

Description

The IBM Toolbox for Java (Db2 Mirror for i 7.4 and 7.5) could allow a user to obtain sensitive information, caused by utilizing a Java string for processing. Since Java strings are immutable, their contents exist in memory until garbage collected. This means sensitive data could be visible in memory over an indefinite amount of time. IBM has addressed this issue by reducing the amount of time the sensitive data is visible in memory. IBM X-Force ID: 241675.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

NVDibm/db2_mirror7.4, 7.5+1
CVEListV5ibm/db2_mirror_for_i7.4, 7.5

Patches

🔴Vulnerability Details

2
GHSA
GHSA-j985-hqc9-r8c9: The IBM Toolbox for Java (Db2 Mirror for i 72023-04-07
CVEList
IBM Db2 Mirror for i information disclosure2023-04-07
CVE-2022-43928 — IBM DB2 Mirror FOR I vulnerability | cvebase