Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2016-0634 |
CWE-ID | CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
IBM SAN Volume Controller Hardware solutions / Other hardware appliances IBM Storwize V3500 Hardware solutions / Other hardware appliances IBM Storwize V3700 Hardware solutions / Other hardware appliances IBM Storwize V5000 Hardware solutions / Other hardware appliances IBM Storwize V7000 Hardware solutions / Other hardware appliances IBM FlashSystem V9000 Hardware solutions / Other hardware appliances IBM Spectrum Virtualize Software Hardware solutions / Other hardware appliances IBM Spectrum Virtualize for Public Cloud Hardware solutions / Other hardware appliances |
Vendor | IBM Corporation |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU13103
Risk: High
CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-0634
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated attacker to execute arbitrary code on the target system.
The vulnerability exists in the expansion of 'h' in the prompt string due to insufficient validation of user-supplied input. A remote attacker can place shell metacharacters in 'hostname' of a machine and execute arbitrary code with elevated privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsIBM SAN Volume Controller: before 7.7.1.9
IBM Storwize V3500: before 7.7.1.9
IBM Storwize V3700: before 7.7.1.9
IBM Storwize V5000: before 7.7.1.9
IBM Storwize V7000: before 7.7.1.9
IBM FlashSystem V9000: before 7.7.1.9
IBM Spectrum Virtualize Software: before 7.7.1.9
IBM Spectrum Virtualize for Public Cloud: before 7.7.1.9
CPE2.3https://www.ibm.com/support/pages/node/650903
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.