Lucene search

K
ibmIBM6EE71D5B8CC229B17D346C2973483FC9B94D57474DA00268794EAB3444B084E0
HistoryJan 31, 2019 - 2:40 a.m.

Security Bulletin: Vulnerabilities in OpenSSL affect IBM Unified Extensible Firmware Interface (UEFI) (CVE-2017-3735 CVE-2017-3736)

2019-01-3102:40:01
www.ibm.com
1

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

Summary

IBM Unified Extensible Firmware Interface (UEFI) has addressed the following vulnerabilities in OpenSSL.

Vulnerability Details

Summary

IBM Unified Extensible Firmware Interface (UEFI) has addressed the following vulnerabilities in OpenSSL.

Vulnerability Details

CVEID: CVE-2017-3735

Description: OpenSSL could allow a remote attacker to obtain sensitive information, caused by an error while parsing an IPAdressFamily extension in an X.509 certificate. An attacker could exploit this vulnerability to trigger an out-of-bounds read, resulting in an incorrect text display of the certificate.

CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/131047&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)

CVEID: CVE-2017-3736

Description: OpenSSL could allow a remote attacker to obtain sensitive information, caused by a carry propagation flaw in the x86_64 Montgomery squaring function bn_sqrx8x_internal(). An attacker with online access to an unpatched system could exploit this vulnerability to obtain information about the private key.

CVSS Base Score: 5.9
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/134397&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

System Name Affected Version
BladeCenter HS23 7875/1929 tke1
BladeCenter HS23E 8038/8039 ahe1
Flex System x220 2585/7906 kse1
Flex System x222 7916 cce1
Flex System x240 7863/8737/8738/8956 b2e1
Flex System x280, x480, x880 7903 n2e1
Flex System x440 7917 cne1
System x iDataPlex dx360 M4 7912/7913 tde1
System x NeXtScale nx360 M4 5455 fhe1
System x3100 M5 5457 j9e1
System x3250 M5 5458 jue1
System x3300 M4 7382 yae1
System x3500 M4 7383 y5e1
System x3550 M4 7914 d7e1
System x3630 M4 7158
System x3530 M4 7160 bee1
System x3650 M4 7915
System x3650 M4 HD 5460 vve1
System x3650 M4 BD 5466 yoe1
System x3750 M4 8718/8722/8733/8752 koe1
System x3850 x6 3837/3839
System x3950 x6 3839 a8e1

Note: The following systems are not affected by this vulnerability.

System x3100 M4 2582

System x3250 M4 2583 jqe1

Remediation/Fixes

Firmware fix versions are available on Fix Central:
<http://www.ibm.com/support/fixcentral/&gt;.

It is recommended to update to the firmware level listed below, or a later version.

System Name Fixed Version
BladeCenter HS23 7875/1929
(ibm_fw_uefi_tke158g-2.30_anyos_32-64) tke158g-2.30
BladeCenter HS23E 8038/8039
(ibm_fw_uefi_ahe158f-2.70_anyos_32-64) ahe158f-2.70
Flex System x220 2585/7906
(ibm_fw_uefi_kse156f-2.10_anyos_32-64) kse156f-2.10
Flex System x222 7916
(ibm_fw_uefi_cce158h-1.90_anyos_32-64) cce158h-1.90
Flex System x240 7863/8737/8738/8956
(ibm_fw_uefi_b2e160f-2.10_anyos_32-64) b2e160f-2.10
Flex System x280, x480, x880 7903
(ibm_fw_uefi_n2e128g-1.80_anyos_32-64) n2e128g-1.80
Flex System x440 7917
(ibm_fw_uefi_cne160g-2.00_anyos_32-64) cne160g-2.00
System x iDataPlex dx360 M4 7912/7913
(ibm_fw_uefi_tde154g-2.00_anyos_32-64) tde154g-2.00
System x NeXtScale nx360 M4 5455
(ibm_fw_uefi_fhe118f-1.80_anyos_32-64) fhe118f-1.80
System x3100 M5 5457
(ibm_fw_uefi_j9e132f-1.70_anyos_32-64) j9e132f-1.70
System x3250 M5 5458
(ibm_fw_uefi_jue132f-1.70_anyos_32-64) jue132f-1.70
System x3300 M4 7382
(ibm_fw_uefi_yae154f-2.00_anyos_32-64) yae154f-2.00
System x3500 M4 7383
(ibm_fw_uefi_y5e156f-2.50_anyos_32-64) y5e156f-2.50
System x3550 M4 7914
(ibm_fw_uefi_d7e162f-2.60_anyos_32-64) d7e162f-2.60
System x3630 M4 7158
System x3530 M4 7160
(ibm_fw_uefi_bee162f-2.90_anyos_32-64) bee162f-2.90
System x3650 M4 7915
System x3650 M4 HD 5460
(ibm_fw_uefi_vve158f-2.60_anyos_32-64) vve158f-2.60
System x3650 M4 BD 5466
(ibm_fw_uefi_yoe124f-2.10_anyos_32-64) yoe124f-2.10
System x3750 M4 8718/8722/8733/8752
(ibm_fw_uefi_koe158f-2.10_anyos_32-64) koe158f-2.10
System x3850 x6 3837/3839
System x3950 x6 3839
(ibm_fw_uefi_a8e126f-1.60_anyos_32-64) a8e126f-1.60

Workarounds and Mitigations

None

References

Related Information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
Lenovo Product Security Advisories

Acknowledgement

None

Change History
19 March 2018: Original Copy Published

  • The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N