SB2023071321 - Multiple vulnerabilities in IBM b-type SAN switches and directors



SB2023071321 - Multiple vulnerabilities in IBM b-type SAN switches and directors

Published: July 13, 2023

Security Bulletin ID SB2023071321
Severity
Medium
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 60% Low 40%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2015-3193)

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists in the Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl on the x86_64 platform, as used by the BN_mod_exp function, due to mishandling of carry propagation and producing incorrect output. A remote attacker can gain potentially sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.

2) NULL pointer dereference (CVE-ID: CVE-2015-3194)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in crypto/rsa/rsa_ameth.c in OpenSSL. A remote attacker can trigger denial of service conditions via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.


3) Information disclosure (CVE-ID: CVE-2015-3195)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists in the ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL. A remote attacker can gain unauthorized access to sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.


4) Race condition (CVE-ID: CVE-2015-3196)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition in the ssl/s3_clnt.c in OpenSSL when used for a multi-threaded client. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system via a crafted ServerKeyExchange message.


5) Input validation error (CVE-ID: CVE-2015-1794)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists in the ssl3_get_key_exchange() function in ssl/s3_clnt.c in OpenSSL. A remote attacker can pass specially crafted zero p value in an anonymous Diffie-Hellman (DH) ServerKeyExchange message to the application and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.