IBM Flex System Manager (FSM) is vulnerable to Venom: โVirtualized Environment Neglected Operation Manipulation.โ
IBM Flex System Manager (FSM) is vulnerable to Venom: โVirtualized Environment Neglected Operation Manipulation.โ
Vulnerability Details:
CVE-ID: CVE-2015-3456
Description: QEMU is vulnerable to a buffer overflow, caused by improper bounds checking by the Floppy Disk Controller (FDC) emulation. By sending specially crafted FDC commands, a guest operating system attacker with access to the FDC I/O ports could overflow a buffer and execute arbitrary code on the system with root privileges. Note: This vulnerability is also being called VENOM.
CVSS Base Score: 7.7
CVSS Temporal Score: See http://exchange.xforce.ibmcloud.com/vulnerabilities/103116 for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:A/AC:L/Au:S/C:C/I:C/A:C)
Product | VRMF | APAR | Remediation |
---|---|---|---|
Flex System Manager | 1.3.3.x | IT10433 | Install fsmfix1.3.3.0_IT10433 |
Flex System Manager | 1.3.2.x | IT10433 | Install fsmfix1.3.2.0_IT10433 |
Flex System Manager | 1.3.1.x | IT10433 | Follow upgrade procedures to upgrade to FSM 1.3.3.0 and follow the appropriate remediation for all vulnerabilities, or open a PMR with support to request an APAR. |
Flex System Manager | 1.3.0.x | IT10433 | Follow upgrade procedures to upgrade to FSM 1.3.3.0 and follow the appropriate remediation for all vulnerabilities, or open a PMR with support to request an APAR. |
Flex System Manager | 1.2.1.x | IT10433 | IBM is no longer providing code updates for this release. Follow upgrade procedures to upgrade to FSM 1.3.3.0 and follow the appropriate remediation for all vulnerabilities. |
Flex System Manager | 1.2.0.x | IT10433 | IBM is no longer providing code updates for this release. Follow upgrade procedures to upgrade to FSM 1.3.3.0 and follow the appropriate remediation for all vulnerabilities. |
Flex System Manager | 1.1.x.x | IT10433 | Effective April 30, 2015, IBM has discontinued service for these version/release/modification/fix levels. |
After you apply the fix, all guests (virtual machines) on the host need to be powered off and then powered back on (not just restarted) for the update to take effect. Note: It is not enough to restart the guests because a restarted guest would continue running using the same (old and not updated) QEMU binary. As an alternative it may also be possible to migrate guests away from the affected host, apply the fix on the host, and then migrate the guests back.
IBM recommends that you review your entire environment to identify vulnerable releases of the open-source hypervisor QEMU and virtualization infrastructures that utilize QEMU and take appropriate mitigation and remediation actions.
None
Related Information:
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
Acknowledgement
None
Change History
21 September 2015: Original Copy Published
Disclaimer
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an โindustry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.โ IBM PROVIDES THE CVSS SCORES โAS ISโ WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.