Lucene search

K
ibmIBMDFC535BDDE06058EFFACF71422EF98599125A69149EE1B2E8F23285F290885A2
HistoryJun 18, 2018 - 12:09 a.m.

Security Bulletin: Samba vulnerability issue on IBM Storwize V7000 Unified (CVE-2015-0240)

2018-06-1800:09:17
www.ibm.com
7

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

Summary

A fix is available for IBM Storwize V7000 Unified, for the security issue that an attacker could execute arbitrary code on the system by exploiting a vulnerability in Samba

Vulnerability Details

CVEID: CVE-2015-0240

DESCRIPTION: Samba is used in IBM Storwize V7000 Unified to enable file management and authentication services for Microsoft Windows environments.

IBM Storwize V7000 Unified includes a version of Samba that is vulnerable to an unexpected code execution vulnerability in the smbd file server daemon. A remote attacker could exploit this vulnerability to execute arbitrary code on the system with root privileges.

CVSS Base Score: 10
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101071&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Affected Products and Versions

IBM Storwize V7000 Unified

All products are affected when running code releases 1.3, 1.4 and 1.5 except for version 1.5.2.0 and above.

Remediation/Fixes

IBM recommends that you fix this vulnerability by upgrading affected versions of IBM Storwize V7000 Unified to the following code level or higher:

1.5.2.0_
__
_Latest Storwize V7000 Unified Software

Workarounds and Mitigations

Workaround(s) : If you are running code release 1.5.0.0 or higher, a work around is also available. Please contact IBM support for details.

Mitigation(s) : Although IBM recommends that you install a level of code with a fix for this vulnerability, you can mitigate, although not eliminate, your risk until you have done so by ensuring that all users who have access to the system are authenticated by another security system such as a firewall.

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C