Your review has been sent successfully

IBM Updates

2848
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

14 April, 2021

● Critical

2021-2752

All

Description:

IBM has released a security update to address several vulnerabilities in the following products:

  • IBM Emptoris Strategic Supply Management
    • Platform 10.1.0.x,10.1.1.x,10.1.3.x
  • InfoSphere Information Server on the Microservices tier
    • 11.7
  • HMC V9.1.910.0
    • V9.1.910.0 and later
  • HMC V9.2.950.0
    • V9.2.950.0 and later
  • IBM CICS TX on Cloud
    • 10.1.0.0
  • IBM Emptoris Contract Management
    • 10.1.3.x,10.1.1.x, 10.1.0.x
  • ICP – Discovery
    • 2.0.0-2.2.1
  • Content Collector for File Systems
    • 4.0.1.x
  • API Connect
    • V5.0.0.0-5.0.8.10
    • V2018.4.1.0-V2018.4.1.13
    • V10.0.0.0-10.0.1.1
  • RBD
    • 9.5
    • 9.6
  • Capilano (Installation Manager)
    • 1.9.x
  • Watson OpenScale
    • 3.5.0
  • IBM Emptoris Sourcing IBM Emptoris Sourcing
    • 10.1.0.x
    • 10.1.1.x
    • 10.1.3.x
  • IBM Cloud Transformation Advisor
    • 2.4.0, 2.4.1
  • InfoSphere Information Server with a microservices tier
    • 11.7
  • IBM TXSeries for Multiplatforms
    • 8.2.0.0-8.2.0.2
    • 1.0.0-9.1.0.1
  • IBM Content Collector for SAP Applications
    • 4.0.0
  • IBM Network Performance Insight
    • 1.3.1
  • App Connect Professional
    • v 7.5.3.0
    • v 7.5.4.0
  • RFT
    • 9.1
    • 9.2
    • 9.5
  • IBM Emptoris Supplier Lifecycle Mgmt
    • 10.1.1.x
    • 10.1.0.x
    • 10.1.3.x
  • Content Collector for Microsoft SharePoint
    • 4.0.1.x
  • terling Connect:Direct
    • FTP+ 1.3
  • IBM Tivoli Application Dependency Discovery Manager
    • 7.3.0.0
  • SPSS Collaboration and Deployment Services
    • 7.0.0.1
    • 8.0
    • 8.1
    • 8.1.1
    • 8.2
    • 8.2.1
    • 8.2.2
  • Content Collector for IBM Connections
    • 4.0.1.x
  • DB2 Query Management Facility for z/OS
    • 11.2.1
    • 12.1
    • 12.2
    • 11.2
    • 11.1
  • Query Management Facility Classic Edition
    • 11.1
  • Query Management Facility Enterprise Edition
    • 11.1
  • DataQuant for z/OS
    • 2.1
  • WebSphere Application Server Liberty1
    • 7.0.0.3 – 21.0.0.3
  • WebSphere Application Server
    • 9.0
    • 8.5
    • 8.0
  • ICP – Discovery
    • 2.0.0-2.2.1
  • InfoSphere Information Server
    • 11.7
  • IBM Watson Explorer Deep Analytics Edition Foundational Components
  • IBM Watson Explorer Deep Analytics Edition Analytical Components
  • IBM Watson Explorer Deep Analytics Edition oneWEX
  • IBM Watson Explorer
  • Foundational Components
  • IBM Watson Explorer Foundational Components
  • IBM Watson Explorer Foundational Components Annotation Administration Console
  • IBM Watson Explorer Analytical Components
  • IBM Watson Explorer Content Analytics Studio
  • WebSphere Extreme Scale
    • 8.6.1
    • 8.6.0
  • ITCAM for Transactions
    • 7.4.0.x
  • IBM Emptoris Program Management
    • 10.1.0.x
    • 10.1.1.x
    • 10.1.3.x
  • IBM Watson Machine Learning on CP4D
    • 2.5,3.0
  • IBM Flex System Chassis Management Module (CMM)
    • 2PET
  • Content Collector for Email
    • 4.0.1.x
  • WebSphere MQ V5.3 for HP NonStop Server (MIPS and Itanium)
    • 53.1.x
  • IBM i
    • 7.1
    • 7.2
    • 7.3
    • 7.4
  • UCD – IBM UrbanCode Deploy
  • IBM Cloud Pak for Automation
    • 20.0.3 IF002
    • 20.0.2
  • Sterling Connect Direct File Agent
    • 1.4.0.0 – 1.4.0.1_iFix005 (AIX and Linux only)

Threats:

Attacker could exploit these vulnerabilities by doing the following:

  • Denial of service attack (DoS)
  • Unauthorized disclosure of information
  • Buffer overflow
  • Execute arbitrary code

Best practice and Recommendations:

The CERT team encourages users to review IBM security advisory and apply the necessary updates:

Last updated at 14 April, 2021

Rate the content

rate-icon
up icon