IBM Support

Security Bulletin: Vulnerability in the Fabric OS used by IBM b-type SAN directors and switches.

Security Bulletin


Summary

Public disclosed vulnerability from OpenSSL in the Fabric OS used by IBM b-type SAN directors and switches.

Vulnerability Details

CVEID:   CVE-2017-3737
DESCRIPTION:   OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/136077 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

Affected Products and Versions

Affected Product(s)Version(s)
FOS8.0
FOS8.1
FOS8.2

Remediation/Fixes

ProductVRMFFix
FOS 8.0 upgrade to FOS 8.1.2h or FOS 8.2.1c
FOS 8.18.1.2hhttps://www-01.ibm.com/support/docview.wss?uid=ssg1S1009577
FOS 8.28.2.1chttps://www-01.ibm.com/support/docview.wss?uid=ssg1S1009577

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Change History

08 Jan 2020: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU050","label":"BU NOT IDENTIFIED"},"Product":{"code":"HW550","label":"Network Switches"},"Component":"FOS Firmware","Platform":[{"code":"PF009","label":"Firmware"}],"Version":"IBM b-type switches and directors","Edition":"All","Line of Business":{"code":"","label":""}}]

Document Information

Modified date:
08 January 2020

Initial Publish date:
08 January 2020

UID

ibm11169914