Lucene search

K
ibmIBM6EC87286DA0DCD2FC65C4A7381F608C359FFEACFAB90CF7C9F318CC3B2A0A699
HistoryJan 31, 2019 - 1:55 a.m.

Security Bulletin: Integrated Management Module II (IMM2) affected by vulnerabilities in libxml2 (CVE-2014-0191, CVE-2014-3660)

2019-01-3101:55:01
www.ibm.com
39

EPSS

0.024

Percentile

90.1%

Summary

Integrated Management Module II (IMM2) is affected by vulnerabilities in libxml2 reported in 2014.

Vulnerability Details

Summary

Integrated Management Module II (IMM2) is affected by vulnerabilities in libxml2 reported in 2014.

Vulnerability Details:

CVE-ID: CVE-2014-0191

Description: Libxml2 is vulnerable to a denial of service, caused by the expansion of internal entities within the xmlParserHandlePEReference() function. A remote attacker could exploit this vulnerability using a specially-crafted XML document containing malicious attributes to consume all available CPU resources.

CVSS Base Score: 5
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/93092&gt; for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-ID: CVE-2014-3660

Description: Libxml2 is vulnerable to a denial of service, caused by the expansion of recursive entities. A remote attacker could exploit this vulnerability using a specially-crafted XML document processed by an application using libxml2 to consume all available CPU resources.

CVSS Base Score: 5
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/97656&gt; for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Affected products and versions

All IMM2 firmware releases prior to v4.90 for these systems:

  • System x3100 M4, type 2582
  • System x3100 M5, type 5457
  • System x3250 M4, type 2583
  • System x3250 M5, type 5458
  • System x3300 M4, type 7382
  • System x3500 M4, type 7383
  • System x3530 M4, type 7160
  • System x3550 M4, type 7914
  • System x3630 M4, type 7158
  • System x3650 M4 BD, type 5466
  • System x3650 M4 HD, type 5460
  • System x3650 M4, type 7915
  • System x3750 M4, types 8752, 8718
  • System x3750 M4, types 8722, 8733
  • System x3850 X6, Type 3837
  • System x3950 X6, Type 3837
  • Datplex dx360 M4, types 7912, 7913
  • iDatplex dx360 M4 Water Cooled, types 7918, 7919
  • NeXtScale nx360 M4, type 5455
  • Flex System x220 Compute Node, types 7906, 2585
  • Flex System x222 Compute Node, type 7916
  • Flex System x240 Compute Node, types 8737, 8738, 7863, 8956
  • Flex System x440 Compute Node, type 7917
  • Flex System x880 Compute Node, types 4259,7903
  • Flex System Manager Node, types 8731, 8734, 7955

Remediation/Fixes:

Firmware updates are available at IBM Fix Central - <http://www.ibm.com/support/fixcentral/&gt; .

It is recommended to update the following affected systems to Integrated Management Module II v4.97 (1AOO66M) or above:

  • System x3100 M4, type 2582
  • System x3100 M5, type 5457
  • System x3250 M4, type 2583
  • System x3250 M5, type 5458
  • System x3300 M4, type 7382
  • System x3500 M4, type 7383
  • System x3530 M4, type 7160
  • System x3550 M4, type 7914
  • System x3630 M4, type 7158
  • System x3570 M4, types 8722, 8733
  • System x3570 M4, types 8752, 8718
  • System x3650 M4 BD, type 5466
  • System x3650 M4 HD, type 5460
  • System x3650 M4, type 7915
  • System x3850 X6, Type 3837
  • System x3950 X6, Type 3837
  • iDatplex dx360 M4, types 7912, 7913
  • iDatplex dx360 M4 Water Cooled, types 7918, 7919
  • NeXtScale nx360 M4, type 5455

It is recommended to update the following affected systems to Integrated Management Module II v4.90 (1AOO66O) or above:

  • Flex System x220 Compute Node, types 7906, 2585
  • Flex System x222 Compute Node, type 7916
  • Flex System x240 Compute Node, types 8737, 8738, 7863, 8956
  • Flex System x440 Compute Node, type 7917
  • Flex System x880 Compute Node, types 4259,7903
  • Flex System Manager Node, types 8731, 8734, 7955

Workarounds and Mitigations:

None

References:

Related Information:
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowledgement

None

Change History
17 April 2015: Original Copy Published

  • The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.