Lucene search

K
ibmIBMA65CEFC9929367770FE675A19EC9CB76F48DEEAE3F869130009F5F1AE9417571
HistoryJun 18, 2018 - 12:09 a.m.

Security Bulletin: Samba vulnerability issue on IBM SONAS (CVE-2015-0240)

2018-06-1800:09:22
www.ibm.com
28

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.974 High

EPSS

Percentile

99.9%

Summary

A fix is available for IBM SONAS, for the security issue that an attacker could execute arbitrary code on the system by exploiting a vulnerability in Samba

Vulnerability Details

IBM SONAS includes a version of Samba that is vulnerable to an unexpected code execution vulnerability in the smbd file server daemon. A remote attacker could exploit this vulnerability to execute arbitrary code on the system with root privileges.

CVEID: CVE-2015-0240 **DESCRIPTION: **Samba could allow a remote attacker to execute arbitrary code on the system, caused by an error in the smbd file server. By sending specially-crafted data followed by an anonymous netlogon packet, an attacker could exploit this vulnerability to trigger an uninitialized memory error and execute arbitrary code on the system with root privileges.

CVSS Base Score: 10
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/101071&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Affected Products and Versions

IBM SONAS

All products are affected when running code releases 1.3, 1.4 and 1.5 except for version 1.5.2.0 and above.

Remediation/Fixes

IBM recommends that you fix this vulnerability by upgrading affected versions of IBM SONAS to the following code level or higher:

1.5.2.0

Please contact IBM support for assistance in upgrading your system.

Workarounds and Mitigations

Workaround(s) : If you are running code release 1.5.0.0 or higher, a work around is also available. Please contact IBM support for details.

Mitigation(s) : Although IBM recommends that you install a level of code with a fix for this vulnerability, you can mitigate, although not eliminate, your risk until you have done so by ensuring that all users who have access to the system are authenticated by another security system such as a firewall.

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.974 High

EPSS

Percentile

99.9%