Lucene search

K
ibmIBM6D3425A0F0AC497D9373EB79F701BB6FE45BF2A5671D3550DEFC979312243F52
HistoryAug 28, 2020 - 11:37 p.m.

Security Bulletin: OpenSSL (Publicly disclosed vulnerability) for IBM b-type switches and directors

2020-08-2823:37:59
www.ibm.com
23

4.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

Summary

Fixes are released for OpenSSL (Publicly disclosed vulnerability) for IBM b-type switches and directors.

Vulnerability Details

CVEID:CVE-2019-1547
**DESCRIPTION:**OpenSSL could allow a local authenticated attacker to obtain sensitive information, caused by the ability to construct an EC group missing the cofactor using explicit parameters instead of using a named curve. An attacker could exploit this vulnerability to obtain full key recovery during an ECDSA signature operation.
CVSS Base score: 5.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/167020 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)

CVEID:CVE-2019-1563
**DESCRIPTION:**OpenSSL could allow a remote attacker to obtain sensitive information, caused by a padding oracle attack in PKCS7_dataDecode and CMS_decrypt_set1_pkey. By sending an overly large number of messages to be decrypted, an attacker could exploit this vulnerability to obtain sensitive information.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/167022 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
FOS 7.4
FOS 8.0
FOS 8.1
FOS 8.2

Remediation/Fixes

Product VRMF Fix
FOS 7.4 7.4.2g <https://www.ibm.com/support/pages/ibm-san-b-type-firmware-version-7x-qualification&gt;
FOS 8.0 upgrade to FOS 8.1.2k , FOS 8.2.1e, or FOS 8.2.2c
FOS 8.1 8.1.2k <https://www-01.ibm.com/support/docview.wss?uid=ssg1S1009577&gt;
FOS 8.1 8.2.1e <https://www-01.ibm.com/support/docview.wss?uid=ssg1S1009577&gt;
FOS 8.2 8.2.2c <https://www-01.ibm.com/support/docview.wss?uid=ssg1S1009577&gt;

Workarounds and Mitigations

None

4.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N