Lucene search

K
ibmIBM03C170FC606E446B9DB694B743F9469744A7832D0F3C07834F7945BDC2A376A4
HistoryJun 18, 2018 - 1:34 a.m.

Security Bulletin: Vulnerabilities in krb5 affect PowerKVM (CVE-2016-3119, CVE-2016-3120)

2018-06-1801:34:16
www.ibm.com
14

EPSS

0.068

Percentile

93.9%

Summary

PowerKVM is affected by vulnerabilities in MIT Kerberos (krb5). IBM has now addressed these vulnerabilities.

Vulnerability Details

CVEID: CVE-2016-3120**
DESCRIPTION:** MIT Kerberos is vulnerable to a denial of service, caused by a NULL pointer dereference in the validate_as_request() function. By sending specially crafted data, a remote authenticated attacker could exploit this vulnerability to cause a denial of service.
CVSS Base Score: 6.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/115438 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2016-3119**
DESCRIPTION:** MIT Kerberos is vulnerable to a denial of service, caused by a NULL pointer dereference in the process_db_args() function. By sending a specially crafted modify_principal command with an empty DB argument, a remote authenticated attacker could exploit this vulnerability to cause a denial of service.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/111772 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

PowerKVM 2.1 and PowerKVM 3.1.

Remediation/Fixes

Customers can update PowerKVM systems by using “yum update”.

Fix images are made available via Fix Central. For version 3.1, see https://ibm.biz/BdHggw. This issue is addressed as of 3.1.0.2 update 3 or later.

For version 2.1, see https://ibm.biz/BdEnT8. This issue is addressed as of PowerKVM 2.1.1.3-65 update 13 or later. Customers running v2.1 are, in any case, encouraged to upgrade to v3.1.

For v2.1 systems currently running fix levels of PowerKVM prior to 2.1.1, please see <http://download4.boulder.ibm.com/sar/CMA/OSA/05e4c/0/README&gt; for prerequisite fixes and instructions.