Lucene search

K
ibmIBMB037C95FAFE82C61596EFFA09796FE31CEB8DF61100FFE948B97A185FE3A0E71
HistoryJun 18, 2018 - 12:09 a.m.

Security Bulletin: Open Source GNU glibc vulnerabilities on IBM Storwize V7000 Unified (CVE-2014-7817, CVE-2014-9087)

2018-06-1800:09:10
www.ibm.com
17

0.017 Low

EPSS

Percentile

87.7%

Summary

IBM Storwize V7000 Unified is shipped with GNU glibc, for which fixes are available for two security vulnerabilities.

Vulnerability Details

CVEID: CVE-2014-7817

**DESCRIPTION:**GNU C Library (glibc) could allow a local attacker to execute arbitrary commands on the system. An attacker could exploit this vulnerability to execute arbitrary commands on the system after obtaining local access to the system.

CVSS Base Score: 4.6
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/98852&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P)

CVEID:CVE-2014-9087

**DESCRIPTION:**Libksba is a library that provides facility to encrypt data and communication. Libksba is vulnerable to a buffer overflow, due to a flaw in one of its functions. A remote attacker could use this vulnerability to execute arbitrary code on the system or cause the application to crash.

CVSS Base Score: 7.5
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/98935&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Affected Products and Versions

IBM Storwize V7000 Unified

The product is affected when running a code releases 1.3.0.0 to 1.5.1.3

Remediation/Fixes

IBM recommends that you fix these vulnerabilities by upgrading affected versions of IBM Storwize V7000 Unified to the following code level or higher:

1.5.2.0

Latest Storwize V7000 Unified Software

Workarounds and Mitigations

Workaround(s): None.

Mitigation(s): Although IBM recommends that you install a level of code with a fix for this vulnerability, you can mitigate, although not eliminate, your risk until you have done so by ensuring that all users who have access to the system are authenticated by another security system such as a firewall.