Lucene search

K
ibmIBMC8C485D395CA65C37348E2AE2CDF9A46AC8F474A6B2C7FE387D620909817AAEA
HistoryMay 21, 2024 - 10:03 p.m.

Security Bulletin: IBM i is vulnerable to a local privilege escalation due to an unqualified library call in IBM Performance Tools for i [CVE-2024-27264].

2024-05-2122:03:58
www.ibm.com
7
ibm i
local privilege escalation
performance tools
vulnerability
ptfs
fix
cve-2024-27264

7.4 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Summary

IBM i is vulnerable to a user gaining elevated privilege due to a program being called without library qualification in IBM Performance Tools for i as described in the vulnerability details section. This bulletin identifies the steps to take to address the vulnerability as described in the remediation/fixes section.

Vulnerability Details

CVEID:CVE-2024-27264
**DESCRIPTION:**IBM Performance Tools for i could allow a local user to gain elevated privileges due to an unqualified library call. A malicious actor could cause user-controlled code to run with administrator privilege.
CVSS Base score: 7.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/284563 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM i 7.5
IBM i 7.4
IBM i 7.3
IBM i 7.2

Remediation/Fixes

The issue can be fixed by applying PTFs to IBM i. IBM i releases 7.5, 7.4, 7.3, and 7.2 will be fixed.

The IBM i PTF numbers for 5770-PT1 contain the fixes for the vulnerability. IBM i 7.5 5770-PT1 is a skip ship product.

IBM i Release

|

5770-PT1
PTF Number

|

PTF Download Link

—|—|—
7.5|

SJ00164
SJ00167
SJ00275

|

<https://www.ibm.com/mysupport/s/fix-information?legacy=SJ00164&gt;
<https://www.ibm.com/mysupport/s/fix-information?legacy=SJ00167&gt;
<https://www.ibm.com/mysupport/s/fix-information?legacy=SJ00275&gt;

7.4|

SJ00164
SJ00167
SJ00275

|

<https://www.ibm.com/mysupport/s/fix-information?legacy=SJ00164&gt;
<https://www.ibm.com/mysupport/s/fix-information?legacy=SJ00167&gt;
<https://www.ibm.com/mysupport/s/fix-information?legacy=SJ00275&gt;

7.3|

SJ00163
SJ00166
SJ00274

|

<https://www.ibm.com/mysupport/s/fix-information?legacy=SJ00163&gt;
<https://www.ibm.com/mysupport/s/fix-information?legacy=SJ00166&gt;
<https://www.ibm.com/mysupport/s/fix-information?legacy=SJ00274&gt;

7.2|

SJ00162
SJ00165
SJ00273

|

<https://www.ibm.com/mysupport/s/fix-information?legacy=SJ00162&gt;
<https://www.ibm.com/mysupport/s/fix-information?legacy=SJ00165&gt;
<https://www.ibm.com/mysupport/s/fix-information?legacy=SJ00273&gt;

<https://www.ibm.com/support/fixcentral&gt;

Important note: IBM recommends that all users running unsupported versions of affected products upgrade to supported and fixed version of affected products.

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmiMatch7.5.0
OR
ibmiMatch7.4.0
OR
ibmiMatch7.3.0
OR
ibmiMatch7.2.0
OR
ibmplanning_analyticsMatch7.4.0
OR
ibmplanning_analyticsMatch7.2.0
OR
ibmplanning_analyticsMatch7.3.0
OR
ibmplanning_analyticsMatch7.5.0

7.4 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for C8C485D395CA65C37348E2AE2CDF9A46AC8F474A6B2C7FE387D620909817AAEA