IBM Support

Security Bulletin: IBM Spectrum Scale for IBM Elastic Storage Server is affected where the local attacker can obtain root privilege by injecting parameters into setuid files (CVE-2019-4558)

Security Bulletin


Summary

The Elastic Storage Server is affected by a vulnerability in IBM Spectrum Scale where one can obtain root privilege by injecting parameters into setuid files. A fix for this vulnerability is available.

Vulnerability Details

CVEID:   CVE-2019-4558
DESCRIPTION:   A security vulnerability has been identified in all levels of IBM Spectrum Scale V5.0.0.0 through V5.0.3.2 and IBM Spectrum Scale V4.2.0.0 through V4.2.3.17 that could allow a local attacker to obtain root privilege by injecting parameters into setuid files.
CVSS Base score: 8.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/166282 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

The Elastic Storage Server 5.3.0 through 5.3.4.1
The Elastic Storage Server 5.0.0 through 5.2.7.0
The Elastic Storage Server 4.5.0 through 4.6.0.0
The Elastic Storage Server 4.0.0 through 4.0.6.0


Remediation/Fixes

For IBM Elastic Storage Server V5.0.0. through V5.3.4.1, apply V5.3.4.2 available from FixCentral at:

https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=Software%20defined%20storage&product=ibm/StorageSoftware/IBM+Elastic+Storage+Server+(ESS)&release=5.3.0&platform=All&function=all

For IBM Elastic Storage Server V5.0.0. through 5.2.7.0, apply V5.2.8  available from FixCentral at:

https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=Software%20defined%20storage&product=ibm/StorageSoftware/IBM+Elastic+Storage+Server+(ESS)&release=5.2.0&platform=All&function=all

 

If you are unable to upgrade to ESS 5.3.2.0 or 5.2.5, please contact IBM Service to obtain an efix:

- For IBM Elastic Storage Server 5.3.0.0 - 5.3.4.1, reference APAR IJ18477
- For IBM Elastic Storage Server 5.0.0.0 - 5.2.7.0, reference APAR IJ18518
- For IBM Elastic Storage Server 4.0.0 - 4.6.0, reference APAR IJ18518

To contact IBM Service, see http://www.ibm.com/planetwide/

 

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Change History

18 Nov 2019: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Document Location

Worldwide

[{"Business Unit":{"code":"BU010","label":"Systems - Storage"},"Product":{"code":"STHMCM","label":"IBM Elastic Storage Server"},"Component":"Spectrum Scale","Platform":[{"code":"PF016","label":"Linux"},{"code":"PF002","label":"AIX"}],"Version":"5.3","Edition":"5.3"}]

Document Information

Modified date:
23 December 2019

UID

ibm11118991