Lucene search

K
ibmIBMEBAC189F3EF841080249A2AC7D88636E7214A84AC7A70AB94CB8E77F2999BDE9
HistoryMay 06, 2020 - 12:02 p.m.

Security Bulletin: Vulnerability in curl affects IBM Cloud Pak System (CVE-2018-14618)

2020-05-0612:02:05
www.ibm.com
15

0.037 Low

EPSS

Percentile

91.8%

Summary

Vulnerability is identified in curl used in Cloud Pak System. Cloud Pak System has addressed the vulnerability.

Vulnerability Details

CVEID:CVE-2018-14618
**DESCRIPTION:**curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/149359 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Cloud Pak System

V2.2.5 - V2.2.6

IBM Cloud Pak System|

V2.3.0, V2.3.0.1

OS Image for Red Hat Linux|

V3.0.10.0

V3.0.11.0

V3.0.12.0

V3.0.13.0

Remediation/Fixes

For Cloud Pak System V2.2.5 - V2.2.6, V2.3.0.1

for OS Image for Red Hat Linux using RHEL V7,

- download and apply the fix as available from Fix Central

OR

Apply Cloud Pak System v2.3.1.1

Information on upgrading can be found here: http://www.ibm.com/support/docview.wss?uid=ibm10887959.

Workarounds and Mitigations

None

CPENameOperatorVersion
ibm cloud pak system softwareeq2.3