CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
EPSS
Percentile
92.7%
IBM Flex System FC43171 8Gb SAN Switch and SAN Pass-thru, QLogic 8Gb Intelligent Pass-thru Module and SAN Switch Module for BladeCenter and QLogic Virtual Fabric Extension Module for IBM BladeCenter have addressed the following vulnerabilities in NTP.
IBM Flex System FC3171 8Gb SAN Switch and SAN Pass-thru, QLogic 8Gb Intelligent Pass-thru Module & SAN Switch Module for BladeCenter and QLogic Virtual Fabric Extension Module for IBM BladeCenter have addressed the following vulnerabilities in NTP.
Vulnerability Details:
CVEID: CVE-2016-1547
Description: NTP is vulnerable to a denial of service, caused by the demobilization of a preemptable client association. By sending specially crafted crypto NAK packets, an attacker could exploit this vulnerability to cause a denial of service.
CVSS Base Score: 3.7
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/112739> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)
CVEID: CVE-2016-1548
Description: NTP could allow a remote attacker to bypass security restrictions, caused by an error in the ntpd client. By changing the client from basic client/server mode to interleaved symmetric mode, an attacker could exploit this vulnerability to modify the time of the client or cause a denial of service.
CVSS Base Score: 7.2
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/112740> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L)
CVEID: CVE-2016-1549
Description: NTP could allow a remote authenticated attacker to bypass security restrictions, caused by the failure to prevent Sybil attacks from authenticated peers. By creating multiple ephemeral associations to win the clock selection of ntpd, an attacker could exploit this vulnerability to modify a victim’s clock.
CVSS Base Score: 5.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/112741> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N)
CVEID: CVE-2016-1551
Description: NTP could allow a remote authenticated attacker to bypass security restrictions, caused by the failure to filter IPv4 bogon packets received from the network. If ntpd is configured to use a reference clock, an attacker could exploit this vulnerability to spoof refclock packets to ntpd processes.
CVSS Base Score: 3.7
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/112743> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
CVEID: CVE-2016-2516
Description: NTP is vulnerable to a denial of service, caused by the improper validation of input. By creating a session with duplicate IPs on unconfig directives, an attacker could exploit this vulnerability to cause an assertion failure.
CVSS Base Score: 4.2
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/112744> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H)
CVEID: CVE-2016-2517
Description: NTP is vulnerable to a denial of service, caused by the improper validation of remote configuration trustedkey/requestkey/controlkey values. By creating a session with duplicate IPs on unconfig directives, an attacker could exploit this vulnerability to cause an assertion botch in ntpd.
CVSS Base Score: 4.2
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/112745> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H)
CVEID: CVE-2016-2518
Description: NTP is vulnerable to a denial of service, caused by an error when using a specially crafted packet to create a peer association with hmode > 7. An attacker could exploit this vulnerability to cause the MATCH_ASSOC() function to trigger an out-of-bounds read.
CVSS Base Score: 2
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/112746> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L)
CVEID: CVE-2016-2519
Description: NTP is vulnerable to a denial of service, caused by the failure to always check the ctl_getitem() function return value. By sending an overly large value, an attacker could exploit this vulnerability to cause a denial of service.
CVSS Base Score: 4.2
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/112747> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H)
Product | Affected Version |
---|---|
IBM Flex System FC3171 8Gb SAN Switch and SAN Pass-thru Firmware | 9.1 |
QLogic 8Gb Intelligent Pass-thru Module & SAN Switch Module for BladeCenter | 7.10 |
QLogic Virtual Fabric Extension Module for IBM BladeCenter | 9.0 |
Firmware fix versions are available on Fix Central:
<http://www.ibm.com/support/fixcentral/>.
Product | Fix Version |
---|---|
IBM Flex System FC3171 8Gb SAN Switch and SAN Pass-thru Firmware | |
qlgc_fw_flex_9.1.9.02.00_anyos_noarch | 9.1.9.02.00 |
QLogic 8Gb Intelligent Pass-thru Module & SAN Switch Module for BladeCenter | |
qlgc_fw_bcsw_7.10.1.40.00_anyos_noarch | 7.10.1.40.00 |
QLogic Virtual Fabric Extension Module for IBM BladeCenter | |
qlgc_fw_bcsw_9.0.3.19.00_anyos_noarch | 9.0.3.19.00 |
You should verify applying the fix does not cause any compatibility issues.
None
Related Information:
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
Lenovo Product Security Advisories
Acknowledgement
None
Change History
17 January 2017: Original Copy Published
09 February 2017: Revised CVE-ID to CVEID and changed http to https in Vulnerability Details section.
Disclaimer
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
EPSS
Percentile
92.7%