Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2018-5733 CVE-2017-3144 |
CWE-ID | CWE-119 CWE-400 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Integrated Management Module II (IMM2) for BladeCenter Systems Other software / Other software solutions Flex System Integrated Management Module (IMM2) Hardware solutions / Other hardware appliances System x Integrated Management Module (IMM2) Hardware solutions / Other hardware appliances |
Vendor | IBM Corporation |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU10791
Risk: Low
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-5733
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists in the dhcpd due to improper handling of reference counting when processing client requests. A remote attacker can send large amounts of data to the target server can send a large number of packets, trigger a reference counter overflow and cause the target dhcpd service to consume all available memory and crash.
Install update from vendor's website.
Vulnerable software versionsIntegrated Management Module II (IMM2) for BladeCenter Systems: before 1AOO84C-6.80-bc
Flex System Integrated Management Module (IMM2): before 1AOO84C-6.80
System x Integrated Management Module (IMM2): before 1AOO84C-6.80
CPE2.3https://www.ibm.com/support/pages/node/717433
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU10031
Risk: Low
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2017-3144
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to improper cleaning up of closed OMAPI connections. A remote attacker who is permitted to establish connections to the OMAPI control port can trigger exhaustion of the pool of socket descriptors available to the DHCP server and cause the service to crash.
Install update from vendor's website.
Vulnerable software versionsIntegrated Management Module II (IMM2) for BladeCenter Systems: before 1AOO84C-6.80-bc
Flex System Integrated Management Module (IMM2): before 1AOO84C-6.80
System x Integrated Management Module (IMM2): before 1AOO84C-6.80
CPE2.3https://www.ibm.com/support/pages/node/717433
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.