Lucene search

K
ibmIBMCEDB8BFA9BCA10C400BC9C75C796E28AC207D7C7C5370FD44BC66D8545229A7D
HistoryJan 31, 2019 - 1:30 a.m.

Security Bulletin: Vulnerabilities in curl affect IBM Flex System Manager (FSM): (CVE-2013-2174 CVE-2013-4545 CVE-2014-0015 CVE-2014-0138 CVE-2014-013)

2019-01-3101:30:01
www.ibm.com
9

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

Summary

Abstract

Security vulnerabilities have been discovered in php5 that is
included in IBM FSM.

Content

Vulnerability Details:

CVE-ID: CVE-2013-2174

DESCRIPTION: cURL/libcURL is vulnerable to a
heap-based buffer overflow, caused by improperb

Vulnerability Details

Abstract

Security vulnerabilities have been discovered in curl that is included in IBM FSM.

Content

Vulnerability Details:

CVE-ID: CVE-2013-2174

DESCRIPTION: cURL/libcURL is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by the curl_easy_unescape() function in lib/escape.c. While decoding URL encoded strings to raw binary data, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.

CVSS Base Score: 6.8
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/85180&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVE-ID: CVE-2013-4545

DESCRIPTION: cURL/libcURL could allow a remote attacker to conduct spoofing attacks, caused by the improper validation of connection host name in TLS/SSL server certificates when the digital signature verification is disabled. By persuading a victim to visit a Web site containing a specially-crafted certificate, a remote attacker could exploit this vulnerability using man-in-the-middle techniques to cause the victim to accept spoofed certificates.

CVSS Base Score: 4.3
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/89181&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVE-ID: CVE-2014-0015

DESCRIPTION: libcURL could allow a remote attacker from within the local network to bypass security restrictions, caused by the re-use of recently authenticated connections. By sending a new NTLM-authenticated request, an attacker could exploit this vulnerability to perform unauthorized actions with the privileges of the victim.

CVSS Base Score: 5
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/90841&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N)


CVE-ID: CVE-2014-0138

DESCRIPTION: cURL/libcURL could allow a remote attacker to bypass security restrictions, caused by the re-use of previously used connections when processing new requests. An attacker could exploit this vulnerability to hijack the privileges of a different user’s session and launch further attacks on the system.

CVSS Base Score: 6.4
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/92131&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:P)

CVE-ID: CVE-2014-0139

DESCRIPTION: cURL/libcURL could allow a remote attacker to bypass security restrictions, caused by an error in the hostmatch() function when validating certificates containing an IP address with a wildcard match within the Common Name field. By sending a specially-crafted SSL certificate containing wildcard characters, a remote attacker could exploit this vulnerability to spoof the server and launch further attacks on the system.

CVSS Base Score: 4.3
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/92130&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N)

Affected products and versions

  • Flex System Manager 1.1.x.x
  • Flex System Manager 1.2.0.x
  • Flex System Manager 1.2.1.x
  • Flex System Manager 1.3.0.x
  • Flex System Manager 1.3.1.x
  • Flex System Manager 1.3.2.x

Remediation:

Vendor Fix:

IBM recommends that you remediate these vulnerabilities through the following code upgrades:

Product

|

VRMF

|

APAR

|

Remediation

—|—|—|—

Flex System Manager

|

1.3.2.x

|

IT00955

|

fsmfix1.3.2.0_IT03592_IT00944_IT00955

Flex System Manager

|

1.3.1.x

|

IT00955

|

fsmfix1.3.1.0_IT03592_IT00944_IT00955

Flex System Manager

|

1.3.0.x

|

IT00955

|

fsmfix1.3.0.0_IT03592_IT00944_IT00955

Flex System Manager

|

1.2.1.x

|

IT00955

|

Upgrade to FSM 1.3.2.0 and follow the appropriate remediation, or open a PMR with support to request an APAR.

Flex System Manager

|

1.2.0.x

|

IT00955

|

Upgrade to FSM 1.3.2.0 and follow the appropriate remediation, or open a PMR with support to request an APAR.

Flex System Manager

|

1.1.x.x

|

IT00955

|

Upgrade to FSM 1.3.2.0 and follow the appropriate remediation, or open a PMR with support to request an APAR.

Workaround(s) & Mitigation(s):

None known.

References:

Related Information:
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowledgement
None

Change History
24 October 2014: Original Copy Published

  • The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.

Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P