Lucene search

K
ibmIBM45812683CEA60D9CC6817DBE36D23E729263EB6EDD74EEA214275620D34EDC74
HistoryJan 25, 2021 - 8:13 p.m.

Security Bulletin: IBM Security Network Intrusion Prevention System can be affected by vulnerabilities in Ruby on Rails (CVE-2012-2660, CVE-2012-2694, CVE-2013-0156, CVE-2012-6496, CVE-2012-3424, and CVE-2012-2695)

2021-01-2520:13:51
www.ibm.com
16

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

Question

Is the Network IPS system affected by Ruby on Rails vulnerabilities?

Answer

IBM Security Network Intrusion Prevention System is affected by multiple vulnerabilities reported in Ruby on Rails. These vulnerabilities include multiple SQL injection, code execution, and denial of service vulnerabilities that could be exploited remotely by an attacker with access to the Local Management Interface (LMI).

Vulnerability Details:

The following information was provided by Ruby on Rails. In the case of IBM Security Network Intrusion Prevention System, the Local Management Interface requires single platform authentication specific to the IPS system, notwithstanding the information in the CVSS vectors specified below. Further for each vulnerability identified below, the vulnerability is remotely exploitable and no specialized knowledge is required.

CVE-2013-0155 identified on the affected version of Ruby on Rails has no impact on the Intrusion Prevention System.

CVE ID: CVE-2012-2660

DESCRIPTION:

A remote attacker could send specially-crafted SQL statements using an unspecified parameter, which could allow the attacker to view, add, modify or delete information in the back-end database.

CVSS Base Score: 7.5
CVSS Temporal Score: _ See_ <https://exchange.xforce.ibmcloud.com/vulnerabilities/76015&gt;_ for the current score_
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE ID: CVE-2012-2694

DESCRIPTION: A remote attacker could send specially-crafted SQL statements to Active Record used in conjunction with parameter parsing from Rack via Action Pack, which could allow the attacker to view, add, modify or delete information in the back-end database.

CVSS Base Score: 7.5
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/76255&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE ID: CVE-2013-0156

DESCRIPTION: Ruby on Rails could allow a remote attacker to execute arbitrary code on the system, caused by multiple errors in the XML parameter parsing code. The XML processor decodes a request as a YAML document or as a Ruby Symbol allowing an attacker to inject SQL commands, inject and execute arbitrary code and cause a denial of service. This will allow the attacker to take full control of the system.

CVSS Base Score: 9.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/81119&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVE ID: CVE-2013-6496

DESCRIPTION: A remote attacker could send specially-crafted SQL statements to the Active Record component which could allow the attacker to view, add, modify or delete information in the back-end database.

CVSS Base Score: 7.5
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/81004&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)

**CVE ID:**CVE-2012-3424

**DESCRIPTION:**By sending specially-crafted data to the Action Pack digest authentication (authenticate_or_request_with_http_digest), an attacker could exploit this to cause the system to crash.

CVSS Base Score: 5
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/77240&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

**CVE ID:**CVE-2012-2695

**DESCRIPTION:**A remote attacker could send specially-crafted SQL statements to the Active Record interface using nested query parameters, which could allow the attacker to view, add, modify or delete information in the back-end database.

CVSS Base Score: 7.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/76260 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)

AFFECTED PRODUCTS AND VERSIONS:

**Products:**GX3002, GX4002, GX4004, GX4004-v2, GX5008, GX5008-v2, GX5108, GX5108-v2, GX5208, GX5208-v2, GX6116, GX7412, GX7412-10, GX7412-05, GX7800, GV200, GV1000
Firmware versions: 4.1, 4.2, 4.3, 4.4, 4.5

REMEDIATION:

These fixes are included in firmware 4.6 for the IPS.
The following IBM Threat Fixpacks have the fixes for these vulnerabilities.

· 4.3.0.0-ISS-ProvG-AllModels-System-FP0001 for all IBM Security Network Intrusion Prevention System products at Firmware version 4.3
· 4.4.0.0-ISS-ProvG-AllModels-System-FP0002 for all IBM Security Network Intrusion Prevention System products at Firmware version 4.4
· 4.5.0.0-ISS-ProvG-AllModels-System-FP0002 for all IBM Security Network Intrusion Prevention System products at Firmware version 4.5

IBM Security Network Intrusion Prevention** **System users on Firmware 4.1 and 4.2 should upgrade to Firmware 4.3, with fixpack 4.3.0.0-ISS-ProvG-AllModels-System-FP0001, or Firmware 4.4, with fixpack 4.4.0.0-ISS-ProvG-AllModels-System-FP0002, or Firmware 4.5, with fixpack 4.5.0.0-ISS-ProvG-AllModels-System-FP0002, or later.

Contact IBM Security Systems Support (http://www.ibm.com/support/entry/portal/overview) to upgrade to the above required Fixpacks.

Workaround(s):
None

Mitigation(s):
None

REFERENCES:
· On-line Calculator V2_ _
· CVE-2012-2660
· CVE-2012-6496
· CVE-2012-2694
· CVE-2013-0156
· CVE-2012-0155
· CVE-2012-3424
· CVE-2012-2695

RELATED INFORMATION:
_IBM Secure Engineering Web Portal _
IBM Product Security Incident Response Blog

ACKNOWLEDGEMENT
None

_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _

_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{“Product”:{“code”:“SS9SBT”,“label”:“Proventia Network Intrusion Prevention System”},“Business Unit”:{“code”:“BU059”,“label”:“IBM Software w/o TPS”},“Component”:“General Information”,“Platform”:[{“code”:“PF009”,“label”:“Firmware”}],“Version”:“4.1;4.2;4.3;4.4;4.5”,“Edition”:“”,“Line of Business”:{“code”:“LOB24”,“label”:“Security Software”}}]

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C