Lucene search

K
ibmIBMD6EE1AE15F7BD96FCB1799E31A9E36026979DFE8E702302D459578E3398E8FC4
HistorySep 26, 2022 - 4:23 a.m.

Security Bulletin: Storwize V7000 Unified V1.4.1.0 Includes Fixes for Multiple Vendor Security Vulnerabilities

2022-09-2604:23:14
www.ibm.com
12

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

Abstract

Storwize V7000 Unified includes multiple software components for which the vendors have provided fixes for security vulnerabilities in such components.

Content

VULNERABILITY DETAILS:

CVE ID:

Vendor Vendor ID Vendor Title Included CVEs
IBM TSM 6.3.1.0 Two unauthorized access vulnerabilities in IBM TSM for Space Management CVE-2012-4859
CVE-2012-5954
IBM IBM Java 6.0.0 SR12 Oracle October 16 2012 CPU CVE-2012-5081
Red Hat RHSA-2012-1210 Critical: Firefox security update CVE-2012-1970
CVE-2012-1972
CVE-2012-1973
CVE-2012-1974
CVE-2012-1975
CVE-2012-1976
CVE-2012-3956
CVE-2012-3957
CVE-2012-3958
CVE-2012-3959
CVE-2012-3960
CVE-2012-3961
CVE-2012-3962
CVE-2012-3963
CVE-2012-3964
CVE-2012-3966
CVE-2012-3967
CVE-2012-3968
CVE-2012-3969
CVE-2012-3970
CVE-2012-3972
CVE-2012-3976
CVE-2012-3978
CVE-2012-3980
Red Hat RHSA-2012-1350 Critical: Firefox security and bug fix update CVE-2012-1956
CVE-2012-3982
CVE-2012-3986
CVE-2012-3988
CVE-2012-3990
CVE-2012-3991
CVE-2012-3992
CVE-2012-3993
CVE-2012-3994
CVE-2012-3995
CVE-2012-4179
CVE-2012-4180
CVE-2012-4181
CVE-2012-4182
CVE-2012-4183
CVE-2012-4184
CVE-2012-4185
CVE-2012-4186
CVE-2012-4187
CVE-2012-4188
Red Hat RHSA-2012-1361 Critical: xulrunner security update CVE-2012-4193
Red Hat RHSA-2012-1407 Critical: Firefox security update CVE-2012-4194
CVE-2012-4195
CVE-2012-4196
Red Hat RHSA-2012-1482 Critical: Firefox security update CVE-2012-4201
CVE-2012-4202
CVE-2012-4207
CVE-2012-4209
CVE-2012-4210
CVE-2012-4214
CVE-2012-4215
CVE-2012-4216
CVE-2012-5829
CVE-2012-5830
CVE-2012-5833
CVE-2012-5835
CVE-2012-5839
CVE-2012-5840
CVE-2012-5841
CVE-2012-5842
Red Hat RHSA-2012-0699 Moderate: openssl security and bug fix update CVE-2012-2333
Red Hat RHSA-2012-0518 Important: openssl security update CVE-2012-2110
Red Hat RHSA-2012-0426 Moderate: openssl security and bug fix update CVE-2012-0884
CVE-2012-1165

DESCRIPTION:
Storwize V7000 Unified has integrated updated versions of the software components for which the vendors have provided fixes for security vulnerabilities.

CVSS:
Please see vendor documentation for CVSS scores and CVSS vector.

AFFECTED PLATFORMS:

  • Affected releases:
    • Storwize V7000 Unified 1.3 code stream: Storwize V7000 Unified 1.3.0.0 through 1.3.2.0.
    • Storwize V7000 Unified 1.4 code stream: Storwize V7000 Unified 1.4.0.X.
  • _Releases/systems/configurations NOT affected: _
    • Storwize V7000 Unified 1.3 code stream: Storwize V7000 Unified 1.3.2.3 and above.
    • Storwize V7000 Unified 1.4 code stream: Refer remediation section below for the list of issues fixed in 1.4.0.4 and 1.4.1.0.

REMEDIATION:

Vendor Fix(es):
Storwize V7000 Unified 1.3 code stream: The issues were fixed beginning with version Storwize V7000 Unified 1.3.2.3. Storwize V7000 Unified customers running an earlier version (e.g. Storwize V7000 Unified 1.3.2.0) must upgrade to Storwize V7000 Unified 1.3.2.3 or a later version in order to get these fixes.
Storwize V7000 Unified 1.4 code stream: The OpenSSL issues (CVE-2012-2333, CVE-2012-2110, CVE-2012-0884, CVE-2012-1165) were fixed beginning with version Storwize V7000 Unified 1.4.0.4 and above. Remaining CVEs were fixed beginning with version Storwize V7000 Unified 1.4.1.0 and above.

Workaround(s): None.

Mitigation(s): Storwize V7000 Unified is not exposed to CVEs related to Firefox and Xulrunner during normal operation. Service procedures which use the Firefox web browser may activate the vulnerable code. Service personnel must not browse web pages on the internet to avoid the processing of web pages with malicious content.

CVE-2012-4859 is not directly exploitable on Storwize V7000 Unified, because Storwize V7000 Unified does not provide a capability to logon as native Unix or Linux user.

CVE-2012-5954 impacts only Storwize V7000 Unified systems, which are configured with TSM HSM.

REFERENCES:

RELATED INFORMATION:

CHANGE HISTORY:

  • 03/18/13: Original copy published.

_The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _

_Note: __According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” _
IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{“Product”:{“code”:“ST5Q4U”,“label”:“IBM Storwize V7000 Unified (2073)”},“Business Unit”:{“code”:“BU058”,“label”:“IBM Infrastructure w/TPS”},“Component”:“1.4”,“Platform”:[{“code”:“PF025”,“label”:“Platform Independent”}],“Version”:“1.3;1.4”,“Edition”:“”,“Line of Business”:{“code”:“LOB26”,“label”:“Storage”}}]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

Related for D6EE1AE15F7BD96FCB1799E31A9E36026979DFE8E702302D459578E3398E8FC4