7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
Multiple security vulnerabilities have been identified in the tar command that is embedded in IBM FSM. This bulletin addresses these vulnerabilities.
CVEID: CVE-2010-0624**
DESCRIPTION:** GNU Tar and GNU Cpio are vulnerable to a heap-based buffer overflow, caused by improper bounds checking by the rmt_read__() function. By persuading a victim to extract a specially-crafted archive file, a remote attacker could overflow a buffer and execute arbitrary code on the system with elevated privileges or cause the application to crash.
CVSS Base Score: 6.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/56803 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVEID: CVE-2016-6321**
DESCRIPTION:** GNU Tar could allow a remote attacker to bypass security restrictions, caused by improper validation of file name. By using a specially-crafted ‘tar’ archive file, an attacker could exploit this vulnerability to to extract files and directories in the given destination.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/118396 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Flex System Manager 1.3.4.0
Flex System Manager 1.3.3.0
Flex System Manager 1.3.2.1
Flex System Manager 1.3.2.0
IBM recommends updating the FSM using the instructions referenced in this table.
WARNING: If an early version (fix downloaded before 4/19/2017) of the fix listed below was installed, the brand information on the FSM login screen will be displayed as “IBM Systems Director”. This branding issue will not cause any functional FSM issues. The correct FSM branding can be restored by downloading the current version of the fix (Release Date of the fix listed in table is 4/26/2017 or later), reinstalling the current version of the fix and restarting the FSM.
Product |
VRMF |
Remediation
—|—|—
Flex System Manager |
1.3.4.0 | Install fsmfix1.3.4.0_IT19321_IT19679_IT19695_IT19698_IT19709_IT19811
Flex System Manager |
1.3.3.0 | Install fsmfix1.3.3.0_IT19321_IT19679_IT19695_IT19698_IT19709_IT19811
Flex System Manager |
1.3.2.1
1.3.2.0 | Install fsmfix1.3.2.0_IT19321_IT19679_IT19695_IT19698_IT19709_IT19811
For all VRMF not listed in this table, IBM recommends upgrading to a fixed and supported version/release of the product.
For a complete list of FSM security bulletins refer to this technote: http://www-01.ibm.com/support/docview.wss?uid=nas7797054ebc3d9857486258027006ce4a0&myns=purflex&mync=E&cm_sp=purflex--NULL--E
None
CPE | Name | Operator | Version |
---|---|---|---|
flex system manager node | eq | any |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P