Lucene search

K
ibmIBM078F88880AEE11A794FF1F9898D0CB9A8DA83D113B012C88EFADA83D33B599DD
HistoryJun 18, 2018 - 12:28 a.m.

Security Bulletin:Samba vulnerability issue on IBM Storwize V7000 Unified (CVE-2016-2119)

2018-06-1800:28:09
www.ibm.com
14

0.005 Low

EPSS

Percentile

76.5%

Summary

IBM Storwize V7000 Unified is shipped with Samba, for which a fix is available for security vulnerabilities.

Vulnerability Details

Samba is used in IBM Storwize V7000 Unified to enable file management and authentication services for Microsoft Windows environments.

CVEID: CVE-2016-2119**
DESCRIPTION:** Samba could allow a remote attacker to conduct spoofing attacks. A man-in-the-middle attacker could exploit this vulnerability to inject the SMB2_SESSION_FLAG_IS_GUEST or SMB2_SESSION_FLAG_IS_NULL flags to downgrade the client’s configuration-required signing protections for SMB2 or SMB3 client connections and spoof the server.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/114797 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

Affected Products and Versions

IBM Storwize V7000 Unified
The product is affected when running code releases 1.5.0.0 to 1.6.1.0

Remediation/Fixes

For 1.5.* release - A fix for this issue is in version 1.5.2.5 of IBM Storwize V7000 Unified.
For 1.6.* release - A fix for this issue is in version 1.6.2.0 of IBM Storwize V7000 Unified.

Customers running an affected version of IBM Storwize V7000 Unified should upgrade to 1.5.2.5 or 1.6.2.0, so that the fix gets applied

Latest Storwize V7000 Unified Software

Workarounds and Mitigations

Workaround:
Setting “client ipc max protocol = NT1”.

If “client signing” is set to “mandatory”/“required”,
remove an explicit setting of “client max protocol”, which will default
to “NT1”.

These changes should be reverted once the security fixes are applied.

Mitigation : No