Lucene search

K
ibmIBM48BECCF0F0DBF8869E21783353BB577EE3EDCF8F59D950C74C2A4597216AC9A5
HistoryJun 18, 2018 - 1:28 a.m.

Security Bulletin:Venom qemu vulnerability affects PowerKVM (CVE-2015-3456)

2018-06-1801:28:20
www.ibm.com
9

7.7 High

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:L/Au:S/C:C/I:C/A:C

Summary

PowerKVM is vulnerable to Venom: Virtualized Environment Neglected Operation Manipulation".

Vulnerability Details

CVEID: CVE-2015-3456** **
DESCRIPTION: QEMU is vulnerable to a buffer overflow, caused by improper bounds checking by the Floppy Disk Controller (FDC) emulation. By sending specially crafted FDC commands, a guest operating system attacker with access to the FDC I/O ports could overflow a buffer and execute arbitrary code on the system with root privileges. Note: This vulnerability is also being called VENOM.

PowerKVM hosts may be susceptible exploit to this even though floppy disk controllers are not supported devices for PowerKVM guests, as a non-privileged user may create a guest containing the emulation model containing the vulnerability.

CVSS Base Score: 7.7
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/#/vulnerabilities/103116 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:A/AC:L/Au:S/C:C/I:C/A:C)

Affected Products and Versions

PowerKVM 2.1

Remediation/Fixes

Fix is made available via Fix Central (https://ibm.biz/BdEnT8) in 2.1.1 SP2 (build 51) and all later builds and fix packs. For systems currently running fix levels of PowerKVM prior to 2.1.1, please see <http://download4.boulder.ibm.com/sar/CMA/OSA/05e4c/0/README&gt; for prerequisite fixes and instructions. Customers can also update from 2.1.1 (GA and later levels) by using β€œyum update”.

Workarounds and Mitigations

none

CPENameOperatorVersion
powerkvmeq2.1

7.7 High

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:L/Au:S/C:C/I:C/A:C