logo
DATABASE RESOURCES PRICING ABOUT US

Security Bulletin: Vulnerabilities in libxml2 and zlib affect IBM Flex System Networking Switch Products

Description

## Summary IBM Flex System Networking Switch Products have addressed the following vulnerabilities in libxml2 and zlib. ## Vulnerability Details **Summary** IBM Flex System Networking Switch Products have addressed the following vulnerabilities in libxml2 and zlib. **Vulnerability Details:** **CVEID:** [CVE-2016-4658](<https://vulners.com/cve/CVE-2016-4658>) **Description:** The libxml2 library, as used in multiple products, could allow a remote attacker to execute arbitrary code on the system, caused by a memory corruption error. An attacker could exploit this vulnerability using a specially crafted XML document to execute arbitrary code on the system or cause a denial of service. CVSS Base Score: 9.8 CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/117175> for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) **CVEID:** [CVE-2016-9318](<https://vulners.com/cve/CVE-2016-9318>) **Description:** Libxml2 could allow a remote attacker to obtain sensitive information, caused by failure to offer a flag directly indicating the status of current document. By using a specially-crafted document to conduct a XML external entity (XXE) attack, an attacker could exploit this vulnerability to obtain sensitive information. CVSS Base Score: 5.5 CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/119018> for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) **CVEID:** [CVE-2016-9840](<https://vulners.com/cve/CVE-2016-9840>) **Description:** zlib is vulnerable to a denial of service, caused by an out-of-bounds pointer arithmetic in inftrees.c. By persuading a victim to open a specially crafted document, a remote attacker could exploit this vulnerability to cause a denial of service. CVSS Base Score: 3.3 CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/120508> for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) **CVEID:** [CVE-2016-9841](<https://vulners.com/cve/CVE-2016-9841>) **Description:** zlib is vulnerable to a denial of service, caused by an out-of-bounds pointer arithmetic in inftrees.c. By persuading a victim to open a specially crafted document, a remote attacker could exploit this vulnerability to cause a denial of service. CVSS Base Score: 3.3 CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/120509> for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) **CVEID:** [CVE-2016-9842](<https://vulners.com/cve/CVE-2016-9842>) **Description:** zlib is vulnerable to a denial of service, caused by an undefined left shift of negative number. By persuading a victim to open a specially crafted document, a remote attacker could exploit this vulnerability to cause a denial of service. CVSS Base Score: 3.3 CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/120510> for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) **CVEID:** [CVE-2016-9843](<https://vulners.com/cve/CVE-2016-9843>) **Description:** zlib is vulnerable to a denial of service, caused by a big-endian out-of-bounds pointer. By persuading a victim to open a specially crafted document, a remote attacker could exploit this vulnerability to cause a denial of service. CVSS Base Score: 3.3 CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/120511> for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) **Affected Products and Versions** Product | Affected Version ---|--- IBM Flex System Fabric EN4093R 10Gb Scalable Switch | 7.8 IBM Flex System Fabric CN4093 10Gb Converged Scalable | 7.8 IBM Flex System Fabric SI4093 System Interconnect | 7.8 IBM Flex System EN2092 1Gb Ethernet Scalable Switch | 7.8 **Remediation/Fixes:** Firmware fix versions are available on Fix Central: <http://www.ibm.com/support/fixcentral/>. Product | Fix Version ---|--- IBM Flex System Fabric EN4093R 10Gb Scalable Switch (ibm_fw_scsw_en4093r-7.8.17.0_anyos_noarch) | 7.8.17.0 IBM Flex System Fabric CN4093 10Gb Converged Scalable Switch (ibm_fw_scsw_cn4093-7.8.17.0_anyos_noarch) | 7.8.17.0 IBM Flex System Fabric SI4093 System Interconnect Module (ibm_fw_scsw_si4093-7.8.17.0_anyos_noarch) | 7.8.17.0 IBM Flex System EN2092 1Gb Ethernet Scalable Switch (ibm_fw_scsw_en2092-7.8.17.0_anyos_noarch) | 7.8.17.0 **Workaround(s) & Mitigation(s):** None **References:** * [Complete CVSS v3 Guide](<http://www.first.org/cvss/user-guide.html>) * [On-line Calculator v3](<http://www.first.org/cvss/calculator/3.0>) **Related Information:** [IBM Secure Engineering Web Portal](<http://www.ibm.com/security/secure-engineering/bulletins.html>) [IBM Product Security Incident Response Blog](<https://www.ibm.com/blogs/psirt/>) [Lenovo Product Security Advisories](<https://support.lenovo.com/us/en/product_security/home>) **Acknowledgement** None **Change History** 23 May 2017: Original Copy Published 08 Jun 2017: Revised Copy Published * The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. **Disclaimer** According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. ##


Related