Lucene search

K
ibmIBM6262BE205F59E8505DF0E5E544252E5622A29A2344CC13221C97360D5C215C65
HistoryJan 31, 2019 - 1:45 a.m.

Security Bulletin: Vulnerability in Open SSL affects IBM System Networking products

2019-01-3101:45:01
www.ibm.com
27

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

Summary

Open SSL used in the System Networking Products is impacted by the CVEs as outlined in the details below.

Vulnerability Details

Abstract

Open SSL used in the System Networking Products is impacted by the CVEs as outlined in the details below.

Content

Vulnerability Details:

CVE-ID: CVE-2014-3505

Description: OpenSSL is vulnerable to a denial of service, caused by a double-free error when handling DTLS packets. A remote attacker could exploit this vulnerability to cause the system to crash.

CVSS Base Score: 5
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/95163&gt; for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-ID: CVE-2014-3506

Description: OpenSSL is vulnerable to a denial of service, caused by an error when processing DTLS handshake messages. A remote attacker could exploit this vulnerability to consume an overly large amount of memory.

CVSS Base Score: 5
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/95160&gt; for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-ID: CVE-2014-3507

Description: OpenSSL is vulnerable to a denial of service. By sending specially-crafted DTLS packets, a remote attacker could exploit this vulnerability to leak memory and cause a denial of service.

CVSS Base Score: 5
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/95161&gt; for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-ID: CVE-2014-3508

Description: OpenSSL could allow a remote attacker to obtain sensitive information, caused by an error in OBJ_obj2txt. If applications echo pretty printing output, an attacker could exploit this vulnerability to read information from the stack.

CVSS Base Score: 4.3
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/95165&gt; for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVE-ID: CVE-2014-3510

Description: OpenSSL is vulnerable to a denial of service, caused by a NULL pointer dereference in anonymous ECDH ciphersuites. A remote attacker could exploit this vulnerability using a malicious handshake to cause the client to crash.

CVSS Base Score: 4.3
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/95164&gt; for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)

Affected products and versions

The following System Networking Products/FW Versions are impacted by this vulnerability.

Affected Product Affected Versions
IBM Flex System Fabric EN4093/EN4093R 10Gb Scalable Switch Prior to 7.8.7.0
IBM Flex System Fabric CN4093 10Gb Converged Scalable Switch Prior to 7.8.7.0
IBM Flex System Fabric SI4093 System Interconnect Module Prior to 7.8.7.0
IBM 10G Virtual Flex System Module for Bladecenter Prior to 7.8.5.0
IBM 1:10G switch for Bladecenter Prior to 7.4.9.0
IBM Flex System EN2092 1Gb Ethernet Scalable Switch Prior to 7.8.7.0
IBM Flex System Interconnect Fabric Prior to 7.8.7.0
IBM System Networking RackSwitch G8052 Prior to 7.9.11.0
IBM System Networking RackSwitch G8124 Prior to 7.9.1.0
IBM System Networking RackSwitch G8124-E Prior to 7.9.11.0
IBM System Networking RackSwitch G8124-ER Prior to 7.9.11.0
IBM System Networking RackSwitch G8264 Prior to 7.9.11.0
IBM System Networking RackSwitch G8316 Prior to 7.9.11.0
IBM System Networking RackSwitch G8264CS Prior to 7.8.7.0
IBM System Networking RackSwitch G8264-T Prior to 7.9.11.0
IBM System Networking RackSwitch G8332 Prior to 7.7.18.0

Remediation/Fixes:

It is recommended to update the firmware versions to the ones as specified below or later and available on Fix Central.

Product FW Versions
IBM Flex System Fabric EN4093/EN4093R 10Gb Scalable Switch 7.8.7.0
IBM Flex System Fabric CN4093 10Gb Converged Scalable Switch 7.8.7.0
IBM Flex System Fabric SI4093 System Interconnect Module 7.8.7.0
IBM 10G Virtual Flex System Module for Bladecenter 7.8.5.0
IBM 1:10G switch for Bladecenter 7.4.9.0
IBM Flex System EN2092 1Gb Ethernet Scalable Switch 7.8.7.0
IBM Flex System Interconnect Fabric 7.8.7.0
IBM System Networking RackSwitch G8052 7.9.11.0
IBM System Networking RackSwitch G8124 7.9.1.0
IBM System Networking RackSwitch G8124-E 7.9.11.0
IBM System Networking RackSwitch G8124-ER 7.9.11.0
IBM System Networking RackSwitch G8264 7.9.11.0
IBM System Networking RackSwitch G8316 7.9.11.0
IBM System Networking RackSwitch G8264CS 7.8.7.0
IBM System Networking RackSwitch G8264-T 7.9.11.0
IBM System Networking RackSwitch G8332 7.7.18.0

Workaround(s) & Mitigation(s):

None

Reference:

Related Information:
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
Subscribe to Security Bulletins

Acknowledgement

None

Change History
12 November 2014: Original Copy Published

  • The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P