IBM RackSwitch Products have addressed the following vulnerabilities in libxml2.
Summary
IBM RackSwitch Products have addressed the following vulnerabilities in libxml2.
Vulnerability Details:
CVEID: CVE-2017-7376
Description: libxml2 is vulnerable to a denial of service, caused by the incorrect limit used when calculating the port value in xmlParse3986Port function. An attacker could exploit this vulnerability to cause a denial of service.
CVSS Base Score: 5.9
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/128276> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
CVEID: CVE-2017-7375
Description: libxml2 could allow a remote attacker to obtain sensitive information, caused by missing validation for external entities in xmlParsePEReference. By sending specially-crafted XML data, an attacker could exploit this vulnerability to obtain sensitive information or cause a denial of service.
CVSS Base Score: 6.5
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/128275> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L)
CVEID: CVE-2017-0663
Description: Google Android could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in libxml2. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code within the context of an unprivileged process.
CVSS Base Score: 7.8
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/127292> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
Affected Products and Versions
Product | Affected Version |
---|---|
IBM RackSwitch G8052 | 7.11 |
IBM RackSwitch G8124/G8124E | 7.11 |
IBM RackSwitch G8264 | 7.11 |
IBM RackSwitch G8264CS | 7.8 |
IBM RackSwitch G8264T | 7.9 |
IBM RackSwitch G8316 | 7.9 |
IBM RackSwitch G8332 | 7.7 |
Remediation/Fixes:
Firmware fix versions are available on Fix Central:
<http://www.ibm.com/support/fixcentral/>.
Product | Fix Version |
---|---|
IBM RackSwitch G8052 (G8052_Image_7.11.11.0) | 7.11.11.0 |
IBM RackSwitch G8124/G8124E (G8124_G8124E_Image_7.11.11.0) | 7.11.11.0 |
IBM RackSwitch G8264 (G8264_Image_7.11.11.0) | 7.11.11.0 |
IBM RackSwitch G8264CS (G8264CS_Image_7.8.18.0) | 7.8.18.0 |
IBM RackSwitch G8264T (G8264T_Image_7.9.21.0) | 7.9.21.0 |
IBM RackSwitch G8316 (G8316_Image_7.9.21.0) | 7.9.21.0 |
IBM RackSwitch G8332 (G8332_Image_7.7.27.0) | 7.7.27.0 |
Workaround(s) & Mitigation(s):
None
References:
Related Information:
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
Lenovo Product Security Advisories
Acknowledgement
None
Change History
21 November 2017: Original Copy Published
Disclaimer
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an βindustry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.β IBM PROVIDES THE CVSS SCORES βAS ISβ WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.