Security Bulletin
Summary
Security vulnerabilities have been identified in current levels of GPFS V3.5 and V3.4 as used within the IBM Virtualization Engine TS7700:
- could allow a local attacker which only has a non-privileged account to execute programs with root privileges (CVE-2015-0197)
- may not properly authenticate network requests and could allow an attacker to execute programs remotely with root privileges (CVE-2015-0198)
Vulnerability Details
CVEID: CVE-2015-0197
DESCRIPTION: IBM General Parallel File System could allow a local attacker which only has a non-privileged account to execute programs with root privileges.
CVSS Base Score: 6.9
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/101224 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:L/AC:M/Au:N/C:C/I:C/A:C)
CVEID: CVE-2015-0198
DESCRIPTION: IBM General Parallel File System may not properly authenticate network requests and could allow an attacker to execute programs remotely with root privileges.
CVSS Base Score: 9.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/101225 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Affected Products and Versions
All versions of microcode for the IBM Virtualization Engine TS7700 (3957-V06, 3957-V07, 3957-VEA, 3957-VEB) prior to release R2.1 are affected. In addition, microcode versions of releases R2.1, R3.0, R3.1 and R3.2 prior to and including the following are also affected:
|
Release | Version |
| R3.2 | 8.32.1.8 |
| R3.1 | 8.31.0.92 |
| R3.0 | 8.30.3.4 |
| R2.1 | 8.21.0.178 |
Remediation/Fixes
Contact IBM Service at 1-800-IBM-SERV to arrange an upgrade to the latest microcode level followed by the installation of vtd_exec.229 as needed. Minimum microcode levels are shown below:
|
Release | Fix |
| R3.0, R3.1 or R3.2 | 8.32.1.8 + vtd_exec.229 |
| R2.1 | 8.21.0.178 + vtd_exec.229 |
Workarounds and Mitigations
Although IBM recommends that you upgrade to the fixes identified above, you can mitigate, but not eliminate the risk of these vulnerabilities by restricting physical and network access to the TS7700 to authorized users and IBM Service Personnel only.
Get Notified about Future Security Bulletins
References
Acknowledgement
The vulnerabilities were reported to IBM by Florian Grunow and Felix Wilhelm of ERNW
Change History
24 July 2015: Original Version Published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
Document Information
Modified date:
17 June 2018
UID
ssg1S1005276