Lucene search

K
ibmIBMDB83C2D211ADD9D4B450E6C1A3771401CD7C41F8CE67B2F01EF9C3D52BF6F8D2
HistoryJun 18, 2018 - 12:09 a.m.

Security Bulletin: IBM Virtualization Engine TS7700 is affected by vulnerabilities in IBM General Parallel File System (CVE-2015-0197, CVE-2015-0198)

2018-06-1800:09:43
www.ibm.com
16

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

Summary

Security vulnerabilities have been identified in current levels of GPFS V3.5 and V3.4 as used within the IBM Virtualization Engine TS7700:
- could allow a local attacker which only has a non-privileged account to execute programs with root privileges (CVE-2015-0197)
- may not properly authenticate network requests and could allow an attacker to execute programs remotely with root privileges (CVE-2015-0198)

Vulnerability Details

CVEID: CVE-2015-0197
DESCRIPTION: IBM General Parallel File System could allow a local attacker which only has a non-privileged account to execute programs with root privileges.
CVSS Base Score: 6.9
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/101224&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVEID: CVE-2015-0198
DESCRIPTION: IBM General Parallel File System may not properly authenticate network requests and could allow an attacker to execute programs remotely with root privileges.
CVSS Base Score: 9.3
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/101225&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)

Affected Products and Versions

All versions of microcode for the IBM Virtualization Engine TS7700 (3957-V06, 3957-V07, 3957-VEA, 3957-VEB) prior to release R2.1 are affected. In addition, microcode versions of releases R2.1, R3.0, R3.1 and R3.2 prior to and including the following are also affected:

Release

| Version
—|—
R3.2| 8.32.1.8
R3.1| 8.31.0.92
R3.0| 8.30.3.4
R2.1| 8.21.0.178

Remediation/Fixes

Contact IBM Service at 1-800-IBM-SERV to arrange an upgrade to the latest microcode level followed by the installation of vtd_exec.229 as needed. Minimum microcode levels are shown below:

Release

| Fix
—|—
R3.0, R3.1 or R3.2| 8.32.1.8 + vtd_exec.229
R2.1| 8.21.0.178 + vtd_exec.229

Workarounds and Mitigations

Although IBM recommends that you upgrade to the fixes identified above, you can mitigate, but not eliminate the risk of these vulnerabilities by restricting physical and network access to the TS7700 to authorized users and IBM Service Personnel only.

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

Related for DB83C2D211ADD9D4B450E6C1A3771401CD7C41F8CE67B2F01EF9C3D52BF6F8D2