Lucene search

K
ibmIBM53B70077E201CFB00DEAC3D1D80DE7FDAF62D8F5C5F21B94868518AD11A351C7
HistoryJun 18, 2018 - 12:36 a.m.

Security Bulletin: GNU C library (glibc) vulnerability affects IBM Storwize V7000 Unified (CVE-2017-1000366)

2018-06-1800:36:07
www.ibm.com
13

0.001 Low

EPSS

Percentile

27.0%

Summary

IBM Storwize V7000 Unified is shipped with GNU glibc, for which a fix is available for a security vulnerability.

Vulnerability Details

A GNU C library (glibc) memory corruption vulnerability affects IBM Storwize V7000 Unified.

CVEID: CVE-2017-1000366**
DESCRIPTION:** Glibc could allow a local attacker to execute arbitrary code on the system, caused by a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack. By using specially-crafted crafted LD_LIBRARY_PATH values, an attacker could exploit this vulnerability to trigger a stack memory allocation flaw and execute arbitrary code on the system.
CVSS Base Score: 7.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/127452 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

IBM Storwize V7000 Unified
The product is affected when running code releases 1.5.0.0 to 1.5.2.6 and 1.6.0.0 to 1.6.2.2

Remediation/Fixes

A fix for this issue is in version 1.6.2.3 of IBM Storwize V7000 Unified. Version 1.5 is end of service. Customers running on this release of IBM Storwize V7000 Unified should upgrade to v1.6.2.3 or a later version, so that the fix gets applied.

Latest Storwize V7000 Unified Software

Workarounds and Mitigations

Mitigation(s) : Although IBM recommends that you install a level of code with a fix for this vulnerability, you can mitigate, although not eliminate, your risk until you have done so by ensuring that all users who have access to the system are authenticated by another security system such as a firewall.

CPENameOperatorVersion
ibm storwize v7000 unified (2073)eq1.6