Lucene search

K
ibmIBM8A697F1BB1EF57602534619AD5B746252F2845C85471DEC66D5E9EDE50759083
HistoryJun 18, 2018 - 12:09 a.m.

Security Bulletin: Open Source GNU glibc vulnerabilities on IBM SONAS (CVE-2014-7817, CVE-2014-9087)

2018-06-1800:09:22
www.ibm.com
15

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Summary

IBM SONAS is shipped with GNU glibc, for which fixes are available for two security vulnerabilities.

Vulnerability Details

CVEID: CVE-2014-7817 **DESCRIPTION: **Provide sufficient details for someone to tell if they have the problem, but not enough detail that someone with malicious intent could use the description to create an exploit

CVSS Base Score: 4.6
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/98852&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P)

CVEID:CVE-2014-9087
**DESCRIPTION:**Libksba is a library that provides facility to encrypt data and communication. Libksba is vulnerable to a buffer overflow, due to a flaw in one of its functions. A remote attacker could use this vulnerability to execute arbitrary code on the system or cause the application to crash.

CVSS Base Score: 7.5
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/98935&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Affected Products and Versions

IBM SONAS

All products are affected when running code releases 1.3, 1.4 and 1.5 except for version 1.5.2.0 and above.

Remediation/Fixes

IBM recommends that you fix these vulnerabilities by upgrading affected versions of IBM SONAS to the following code level or higher:

1.5.2.0

Please contact IBM support for assistance in upgrading your system.

Workarounds and Mitigations

Workaround(s): None.

Mitigation(s): Although IBM recommends that you install a level of code with a fix for this vulnerability, you can mitigate, although not eliminate, your risk until you have done so by ensuring that all users who have access to the system are authenticated by another security system such as a firewall.

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P