Risk | High |
Patch available | YES |
Number of vulnerabilities | 5 |
CVE-ID | CVE-2018-7183 CVE-2018-7185 CVE-2018-7170 CVE-2018-7182 CVE-2018-7184 |
CWE-ID | CWE-119 CWE-20 CWE-264 CWE-200 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #4 is available. |
Vulnerable software |
QLogic 8Gb Intelligent Pass-thru Module & SAN Switch Module for BladeCenter Hardware solutions / Other hardware appliances Flex System FC3171 8Gb SAN Pass-thru Hardware solutions / Other hardware appliances Flex System FC3171 8Gb SAN Switch Hardware solutions / Other hardware appliances |
Vendor | IBM Corporation |
Security Bulletin
This security bulletin contains information about 5 vulnerabilities.
EUVDB-ID: #VU10802
Risk: High
CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2018-7183
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote unauthenticated attacker to execute arbitrary code on the target system.
The weakness exists in the decodearr() function of the ntpq monitoring and control program for ntpd used by the Network Time Protocol due to boundary error while attempting to decode an array in a response string when formatted data is being displayed. A remote attacker who is able to read an ntpq request while the request is being transmitted to a remote ntpd server can forge and send a specially crafted response to the targeted system prior
to the remote ntpd server sending its response, trigger out-of-bounds
write in the decodearr()
function and inject and execute arbitrary code.
Install update from vendor's website.
Vulnerable software versionsQLogic 8Gb Intelligent Pass-thru Module & SAN Switch Module for BladeCenter: before 7.10.1.45.00
Flex System FC3171 8Gb SAN Pass-thru: before 9.1.14.02.00
Flex System FC3171 8Gb SAN Switch: before 9.1.14.02.00
CPE2.3https://www.ibm.com/support/pages/node/730717
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU10803
Risk: Low
CVSSv4.0: 0.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-7185
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated attacker to cause DoS condition on the target system.
The weakness exists due to insufficient validation of user-supplied input. A remote attacker can submit continuous crafted packets and cause the service to crash.
Install update from vendor's website.
Vulnerable software versionsQLogic 8Gb Intelligent Pass-thru Module & SAN Switch Module for BladeCenter: before 7.10.1.45.00
Flex System FC3171 8Gb SAN Pass-thru: before 9.1.14.02.00
Flex System FC3171 8Gb SAN Switch: before 9.1.14.02.00
CPE2.3https://www.ibm.com/support/pages/node/730717
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU10801
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-7170
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated attacker to bypass security restrictions on the target system.
The weakness exists due to insufficient security restrictions. A remote attacker can create multiple crafted ephemeral associations to bypass security restrictions and modify the clock.
Install update from vendor's website.
Vulnerable software versionsQLogic 8Gb Intelligent Pass-thru Module & SAN Switch Module for BladeCenter: before 7.10.1.45.00
Flex System FC3171 8Gb SAN Pass-thru: before 9.1.14.02.00
Flex System FC3171 8Gb SAN Switch: before 9.1.14.02.00
CPE2.3https://www.ibm.com/support/pages/node/730717
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU10798
Risk: Low
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2018-7182
CWE-ID:
CWE-200 - Information exposure
Exploit availability: Yes
DescriptionThe vulnerability allows a remote unautheticated attacker to obtain potentially sensitive information.
The weakness exists due to insufficient validation user-supplied input. A remote attacker can submit a specially crafted mode 6 packet and gain access to potentially sensitive information.
MitigationInstall update from vendor's website.
Vulnerable software versionsQLogic 8Gb Intelligent Pass-thru Module & SAN Switch Module for BladeCenter: before 7.10.1.45.00
Flex System FC3171 8Gb SAN Pass-thru: before 9.1.14.02.00
Flex System FC3171 8Gb SAN Switch: before 9.1.14.02.00
CPE2.3https://www.ibm.com/support/pages/node/730717
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU10799
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-7184
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to insufficient security restrictions. A remote attacker can cause interleaved symmetric mode to crash.
Install update from vendor's website.
Vulnerable software versionsQLogic 8Gb Intelligent Pass-thru Module & SAN Switch Module for BladeCenter: before 7.10.1.45.00
Flex System FC3171 8Gb SAN Pass-thru: before 9.1.14.02.00
Flex System FC3171 8Gb SAN Switch: before 9.1.14.02.00
CPE2.3https://www.ibm.com/support/pages/node/730717
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.