Security Bulletin
Summary
IBM Virtualization Engine TS7700 is vulnerable to two potential denial of service conditions due to WebSphere Application Server Liberty. IBM Virtualization Engine TS7700 has addressed the applicable CVEs.
Vulnerability Details
CVEID: CVE-2021-35517
DESCRIPTION: Apache Commons Compress is vulnerable to a denial of service, caused by an out of memory error when allocating large amounts of memory. By persuading a victim to open a specially-crafted TAR archive, a remote attacker could exploit this vulnerability to cause a denial of service condition against services that use Compress' tar package.
CVSS Base score: 5.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/205307 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)
CVEID: CVE-2021-36090
DESCRIPTION: Apache Commons Compress is vulnerable to a denial of service, caused by an out-of-memory error when large amounts of memory are allocated. By reading a specially-crafted ZIP archive, a remote attacker could exploit this vulnerability to cause a denial of service condition against services that use Compress' zip package.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/205310 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Affected Products and Versions
All versions of microcode for the IBM Virtualization Engine TS7700 (3957-VEC and 3957-VED) prior to and including the following are affected:
| Machine Type | Model | Release | Version |
| 3957 | VEC | R5.0 | 8.50.2.6 |
| R5.1 | 8.51.1.26 | ||
| R5.2 Phase 1 | 8.52.100.32 | ||
| VED | R5.0 | 8.50.2.6 | |
| R5.1 | 8.51.1.26 | ||
| R5.2 Phase 1 | 8.52.100.32 |
Later microcode versions are not affected by the vulnerabilities reported in this Security Bulletin.
Remediation/Fixes
Visit https://tape.ibmrcl.enterpriseappointments.com/v2/ or contact IBM Service at 1-800-IBM-SERV to arrange an upgrade to the latest microcode version followed by the installation of the appropriate code-specific VTD_EXEC (384 or 900 or 901) as needed. Affected microcode versions are shown below:
| Machine Type | Model | Release | Fix |
| 3957 | VEC | R5.0 | Upgrade to 8.50.2.6 + VTD_EXEC.384 |
| R5.1 | Upgrade to 8.51.1.26 + VTD_EXEC.900 - OR - Upgrade to 8.51.2.12 | ||
| R5.2 Phase 1 | Upgrade to 8.52.100.32 + VTD_EXEC.901 | ||
| R5.2 Phase 2 | Upgrade to 8.52.200.109 | ||
| VED | R5.0 | Upgrade to 8.50.2.6 + VTD_EXEC.384 | |
| R5.1 | Upgrade to 8.51.1.26 + VTD_EXEC.900 - OR - Upgrade to 8.51.2.12 | ||
| R5.2 Phase 1 | Upgrade to 8.52.100.32 + VTD_EXEC.901 | ||
| R5.2 Phase 2 | Upgrade to 8.52.200.109 |
The minimum VTD_EXEC versions are shown below:
| VTD_EXEC Package | Version |
| VTD_EXEC.384 | v1.01 |
| VTD_EXEC.900 | v1.05 |
| VTD_EXEC.901 | v1.03 |
Workarounds and Mitigations
Although IBM recommends that you upgrade to the fixes identified above, you can mitigate, but not eliminate the risk of these vulnerabilities by restricting physical and network access to the TS7700 to authorized users and IBM Service Personnel only.
Get Notified about Future Security Bulletins
References
Acknowledgement
Change History
14 Jan 2021: Initial Publication
07 Mar 2021: Add fix for R5.0
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
07 March 2022
Initial Publish date:
14 January 2021
UID
ibm16524972