Lucene search

K
ibmIBME63E97A0C1A09A4408E0BE86CD1EB7E66D6DBF690EF1BF8BBE4A047E38456339
HistoryJun 15, 2018 - 7:02 a.m.

Security Bulletin: Vulnerabilities in glibc could lead to a local or remote buffer overflow in IBM SOA Policy Gateway Pattern for Red Hat Enterprise Linux Server . (CVE-2015-1472, CVE-2013-7423)

2018-06-1507:02:48
www.ibm.com
10

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Summary

Vulnerabilities were found and fixed in the GNU C Library that could lead to buffer overflows and local leakage of sensitive information…

Vulnerability Details

CVE-2015-1472
Description: GNU glibc is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by stdio-common/vfscanf.c. A remote attacker could overflow a buffer and execute arbitrary code on the system or cause a denial of service.
CVSS Base Score: 4.6
CVSS Temporal Score: https://exchange.xforce.ibmcloud.com/vulnerabilities_/100635_ for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P)

_
_CVE-2013-7423
Description: GNU glibc could allow a local attacker to obtain sensitive information, caused by the writing of DNS queries to random file descriptors under high load by the getaddrinfo() function. An attacker could exploit this vulnerability to obtain sensitive information.
CVSS Base Score: 1.2
CVSS Temporal Score: https://exchange.xforce.ibmcloud.com/vulnerabilities_/100647_ for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:L/AC:H/Au:N/C:P/I:N/A:N)

Affected Products and Versions

IBM SOA Policy Gateway Pattern for Red Hat Enterprise Linux Server version 2.5

Remediation/Fixes

Fixes for these issues are currently only available in very recent releases of glibc, for which there is as yet no official Red Hat patch. Users who wish to mitigate this issue should download and apply glibc release 2.21 or later from the GNU web site.

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P