Lucene search

K
ibmIBMB72ECD5BD3C63310933F2E3B0866F34C7333D9ADA444D51522D467DB5F74746A
HistoryDec 18, 2019 - 2:26 p.m.

Security Bulletin: Vulnerability in OSPFv2 Routing Protocol Used in IBM i Operating System (CVE-2013-0149 and CVE-2013-5385)

2019-12-1814:26:38
www.ibm.com
40

EPSS

0.006

Percentile

77.6%

Problem

: The OSPFv2 routing protocol specified in RFC 2328 has an ambiguity that can be exploited and allow for traffic to be black-holed and/or redirected. A PTF is provided.

Resolving The Problem

VULNERABILITY DETAILS:

DESCRIPTION:
A potential protocol vulnerability has been identified in the OSPFv2 Layer-3 routing protocol. If an attacker sends a specially crafted OSPFv2 Link State Advertisement (LSA) packet, it may result in the corruption of routing tables. The attack does not require local network access or physical access to the network and is therefore remotely exploitable, but specialized knowledge and techniques are required to execute this attack. A successful exploit will not impact integrity of transmitted data, but the availability of the network may be affected. Moreover, confidentiality of information may be compromised, although the attacker would not have control over what can be accessed.

**CVEID:*CVE-2013-0149 and CVE-2013-5385
CVSS Base Score: 7.8
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/84112&gt; for the current score
CVSS Environmental Score
: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:C)

AFFECTED PRODUCTS AND VERSIONS:
IBM i 6.1 and IBM i 7.1 are affected.

REMEDIATION:
The issue can be fixed by applying a PTF to the IBM i OS.

The IBM i PTF numbers are:

V5R4 – Not affected by this vulnerability
6.1 SI50218
7.1 SI50213

Workaround(s):
<None>

Mitigation(s): <None>

REFERENCES:
· Complete CVSS Guide
· On-line Calculator V2_ _
· _CVE-2013-0149 _
· _X-Force Vulnerability Database _http://xforce.iss.net/xforce/xfdb/84112

RELATED INFORMATION:
_IBM Secure Engineering Web Portal _
IBM Product Security Incident Response Blog

ACKNOWLEDGEMENT
The vulnerability was reported to IBM by Dr. Gabi Nakibly

CHANGE HISTORY
01 August 2013: Original Copy Published

_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _

_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{“Type”:“MASTER”,“Line of Business”:{“code”:“LOB57”,“label”:“Power”},“Business Unit”:{“code”:“BU058”,“label”:“IBM Infrastructure w/TPS”},“Product”:{“code”:“SWG60”,“label”:“IBM i”},“Platform”:[{“code”:“PF012”,“label”:“IBM i”}],“Version”:“6.1.0”}]

Historical Number

677961906

EPSS

0.006

Percentile

77.6%