Multiple vulnerabilities in IBM Integrated Management Module (IMM) for System x & BladeCenter



Published: 2017-05-08 | Updated: 2024-05-22
Risk Medium
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2016-3627
CVE-2015-8806
CVE-2016-4447
CVE-2016-4449
CWE-ID CWE-674
CWE-122
CWE-119
CWE-611
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
IBM Integrated Management Module
Other software / Other software solutions

Vendor IBM Corporation

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Uncontrolled Recursion

EUVDB-ID: #VU89736

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-3627

CWE-ID: CWE-674 - Uncontrolled Recursion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability occurs when xmlStringGetNodeList function in tree.c in libxml2 used in recovery mode. A remote attacker can cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Integrated Management Module: before YUOOH4B - 1.53

External links

http://www.ibm.com/support/pages/node/868736


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Heap-based buffer overflow

EUVDB-ID: #VU89742

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2015-8806

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause a denial of service.

The vulnerability exists due to a boundary error. A remote attacker can cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the " substring in a crafted HTML document.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Integrated Management Module: before YUOOH4B - 1.53

External links

http://www.ibm.com/support/pages/node/868736


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Buffer overflow

EUVDB-ID: #VU89740

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-4447

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause a denial of service.

The vulnerability exists in xmlParseElementDecl function in parser.c in libxml2. A remote attacker can cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Integrated Management Module: before YUOOH4B - 1.53

External links

http://www.ibm.com/support/pages/node/868736


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) XXE attack

EUVDB-ID: #VU8016

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-4449

CWE-ID: CWE-611 - Improper Restriction of XML External Entity Reference ('XXE')

Exploit availability: No

Description

The vulnerability allows a remote attacker to conduct XXE attack.

The weakness exists in libxml2 due to XML external entity (XXE) error when processing XML data by the XML parser. A remote attacker can send manipulated XML content, trick the victim into opening and read important data on the system.

Successful exploitation of the vulnerability may result in information disclosure.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Integrated Management Module: before YUOOH4B - 1.53

External links

http://www.ibm.com/support/pages/node/868736


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###