Lucene search

K
ibmIBM0AF3FBB4F35E4D5AA60EEF9D9ECA8EE8446AD91295C7F8AE77F0C607CE1A2A3A
HistoryJun 15, 2018 - 7:05 a.m.

Security Bulletin: GNU C library (glibc) vulnerability affects IBM Workload Deployer. (CVE-2015-7547)

2018-06-1507:05:20
www.ibm.com
19

EPSS

0.974

Percentile

99.9%

Summary

A GNU C library (glibc) stack-based buffer overflow in getaddrinfo() vulnerability affects IBM Workload Deployer.

Vulnerability Details

CVEID: CVE-2015-7547 DESCRIPTION: GNU C Library (glibc) is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the nss_dns backend for the getaddrinfo() function when performing dual A/AAAA DNS queries. By sending a specially crafted DNS response, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
CVSS Base Score: 8.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/110662 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

IBM Workload Deployer version 3.1 and later

Remediation/Fixes

The solution is to apply the following IBM Workload Deployer fix:

Upgrade the IBM Workload Deployer to the following fix level:

Product

|

VRMF

|

Remediation/First Fix

—|—|—
IBM Workload Deployer System| Release V3.1.0.7| V3.1.0.7 Interim fix11,

http://www.ibm.com/support/fixcentral/swg/downloadFixes?parent=ibm~WebSphere&product=ibm/WebSphere/IBM+Workload+Deployer&release=3.1.0.7&platform=All&function=fixId&fixids=3.1.0.7-ifix11-IBM_Workload_Deployer&includeRequisites=1&includeSupersedes=0

Workarounds and Mitigations

None