Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2015.0137 PowerKVM Multiple vulnerabilities 21 January 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM PowerKVM Publisher: IBM Operating System: Linux variants Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Root Compromise -- Existing Account Access Privileged Data -- Remote/Unauthenticated Increased Privileges -- Existing Account Overwrite Arbitrary Files -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Unauthorised Access -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2014-9130 CVE-2014-9087 CVE-2014-8884 CVE-2014-8769 CVE-2014-8767 CVE-2014-8709 CVE-2014-8369 CVE-2014-8106 CVE-2014-7975 CVE-2014-7970 CVE-2014-7841 CVE-2014-7826 CVE-2014-7825 CVE-2014-7824 CVE-2014-7823 CVE-2014-7815 CVE-2014-7283 CVE-2014-7145 CVE-2014-6418 CVE-2014-6417 CVE-2014-6416 CVE-2014-6410 CVE-2014-5388 CVE-2014-5077 CVE-2014-5031 CVE-2014-5030 CVE-2014-5029 CVE-2014-4943 CVE-2014-4877 CVE-2014-4667 CVE-2014-4656 CVE-2014-4655 CVE-2014-4654 CVE-2014-4653 CVE-2014-4652 CVE-2014-4650 CVE-2014-4607 CVE-2014-4171 CVE-2014-4014 CVE-2014-3917 CVE-2014-3689 CVE-2014-3687 CVE-2014-3673 CVE-2014-3660 CVE-2014-3640 CVE-2014-3639 CVE-2014-3638 CVE-2014-3637 CVE-2014-3636 CVE-2014-3635 CVE-2014-3537 CVE-2014-3186 CVE-2014-3185 CVE-2014-3184 CVE-2014-3183 CVE-2014-3182 CVE-2014-3181 CVE-2014-0206 CVE-2014-0181 CVE-2013-6399 CVE-2013-4542 CVE-2013-4540 CVE-2013-4539 CVE-2013-4538 CVE-2013-4536 CVE-2013-4535 CVE-2013-4533 CVE-2013-4531 CVE-2013-4530 CVE-2013-4529 CVE-2013-4527 CVE-2013-4526 CVE-2013-4151 CVE-2013-4150 CVE-2013-4148 Reference: ESB-2015.0093 ESB-2015.0018 ESB-2015.0003 ESB-2014.2341 ESB-2014.2275 ESB-2014.1333 ESB-2014.1239 ESB-2014.1208 Original Bulletin: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021961 http://www-01.ibm.com/support/docview.wss?uid=isg3T1021964 http://www-01.ibm.com/support/docview.wss?uid=isg3T1021943 http://www-01.ibm.com/support/docview.wss?uid=isg3T1021954 http://www-01.ibm.com/support/docview.wss?uid=isg3T1021951 http://www-01.ibm.com/support/docview.wss?uid=isg3T1021952 http://www-01.ibm.com/support/docview.wss?uid=isg3T1021950 http://www-01.ibm.com/support/docview.wss?uid=isg3T1021963 http://www-01.ibm.com/support/docview.wss?uid=isg3T1021958 http://www-01.ibm.com/support/docview.wss?uid=isg3T1021949 http://www-01.ibm.com/support/docview.wss?uid=isg3T1021955 http://www-01.ibm.com/support/docview.wss?uid=isg3T1021953 http://www-01.ibm.com/support/docview.wss?uid=isg3T1021956 Comment: This bulletin contains thirteen (13) IBM security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- Security Bulletin: PowerKVM LibYAML Vulnerability - CVE-2014-9130 Document information More support for: PowerKVM Software version: 2.1 Operating system(s): Linux Software edition: KVM Reference #: T1021961 Modified date: 2015-01-20 Security Bulletin Summary PowerKVM's LibYAML and the perl YAML-LibYAML module are vulnerable to a denial of service attack. Vulnerability Details CVEID: CVE-2014-9130 DESCRIPTION: LibYAML and the perl YAML-LibYAML module are vulnerable to a denial of service, caused by an error in the scanner.c file. A remote attacker could exploit this vulnerability using a specially-crafted yaml file to trigger an assertion failure. CVSS Base Score: 4.3 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/99047 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P) Effective CVSS Score: 4.30 Affected Products and Versions PowerKVM 2.1 Remediation/Fixes Fix is made available via Fix Central https://ibm.biz/BdEnT8 in fix pack "ibm-powerkvm-updates-2.1.1.0-33.0" and all later fix packs. See the README at https://ibm.biz/BdEnTL for prerequisite fixes and instructions. Workarounds and Mitigations none Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. References Complete CVSS Guide On-line Calculator V2 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Acknowledgement none Change History January 8, 2015 - Original Version Published January 15, 2015 - Updated summary and CVSS details *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - -------------------------------------------------------------------------- Security Bulletin: PowerKVM CUPS Vulnerabilities: Multiple CVEs Document information More support for: PowerKVM Software version: 2.1 Operating system(s): Linux Software edition: KVM Reference #: T1021964 Modified date: 2015-01-20 Security Bulletin Summary PowerKVM has four local and remote CUPS vulnerabilities.. Vulnerability Details CVEID: CVE-2014-5029 DESCRIPTION: CUPS could allow a local attacker to gain elevated privileges on the system, caused by an incomplete fix related to a symlink attack. A local attacker with lp group privileges could exploit this vulnerability by creating a symbolic link from /var/cache/cups/rss/ to a local target file and then sending a request to the Web interface using the rss/ web resource, which could allow the attacker to view arbitrary files on the system with elevated privileges. CVSS Base Score: 4.4 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/94805 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:M/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-5030 DESCRIPTION: CUPS could allow a local attacker to gain elevated privileges on the system, caused by an incomplete fix related to a symlink attack. A local attacker with lp group privileges could exploit this vulnerability by creating a symbolic link from /var/cache/cups/rss/ to a local target file and then sending a request to the Web interface using the rss/ web resource, which could allow the attacker to view arbitrary files on the system with elevated privileges. CVSS Base Score: 4.4 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/94806 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:M/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-5031 DESCRIPTION: CUPS could allow a local attacker to gain elevated privileges on the system, caused by an incomplete fix related to a symlink attack. A local attacker with lp group privileges could exploit this vulnerability by creating a symbolic link from /var/cache/cups/rss/ to a local target file and then sending a request to the Web interface using the rss/ web resource, which could allow the attacker to view arbitrary files on the system with elevated privileges. CVSS Base Score: 4.4 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/94807 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:M/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-3537 DESCRIPTION: CUPS could allow a local attacker to gain elevated privileges on the system, caused by an error in the get_file() function. A local attacker with lp group privileges could exploit this vulnerability by creating a symbolic link from /var/cache/cups/rss/ to a local target file and then sending a request to the Web interface using the rss/ web resource, which could allow the attacker to view arbitrary files on the system with elevated privileges. CVSS Base Score: 4.4 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/94749 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:M/Au:N/C:P/I:P/A:P) Effective CVSS Score: 4.40 Affected Products and Versions PowerKVM 2.1 Remediation/Fixes Fix is made available via Fix Central https://ibm.biz/BdEnT8 in fix pack "ibm-powerkvm-updates-2.1.1.0-33.0" and all later fix packs. See the README at https://ibm.biz/BdEnTL for prerequisite fixes and instructions. Workarounds and Mitigations none Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. References Complete CVSS Guide On-line Calculator V2 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Acknowledgement none Change History January 9, 2015 - Original Version Published January 15, 2015 - Updated summary and CVSS details *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - --------------------------------------------------------------------------- Security Bulletin: PowerKVM Kernel Vulnerabilities - Multiple CVEs Document information More support for: PowerKVM Software version: 2.1 Operating system(s): Linux Software edition: KVM Reference #: T1021943 Modified date: 2015-01-20 Security Bulletin Summary There are 36 kernel vulnerabilities from 2014 in PowerKVM. Vulnerability Details CVEID: CVE-2014-4014 DESCRIPTION: Linux Kernel could allow a local attacker to gain elevated privileges on the system, caused by an error in the inode_capable() function. An attacker could exploit this vulnerability to execute arbitrary code on the system with kernel-level privileges. CVSS Base Score: 7.2 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93767 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:C) CVEID: CVE-2014-4655 DESCRIPTION: Linux Kernel is vulnerable to a buffer overflow, caused by improper bounds checking bysound/core/control.c. By sending an overly long argument, a local attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. CVSS Base Score: 4.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/94101 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-3181 DESCRIPTION: Linux Kernel is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the magicmouse_raw_event function within the Magic Mouse HID driver. By sending an overly long string, a local attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. CVSS Base Score: 7.2 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/95927 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:C) CVEID: CVE-2014-5077 DESCRIPTION: Linux Kernel is vulnerable to a denial of service caused by a NULL pointer dereference in the sctp_assoc_update() function on systems with SCTP authentication enabled. By sending specially-crafted SCTP data, a remote attacker could exploit this vulnerability to cause the system kernel to crash. CVSS Base Score: 7.1 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/95134 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:C) CVEID: CVE-2014-7825 DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by an out-of-bounds memory access error in trace_syscalls.c. A local attacker could exploit this vulnerability to cause the system to crash. CVSS Base Score: 4.9 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/98557 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:C) CVEID: CVE-2014-3917 DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by an error in the audit_filter_syscall() function. A local attacker could exploit this vulnerability to cause the kernel to crash. CVSS Base Score: 4.9 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93437 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:C) CVEID: CVE-2014-4656 DESCRIPTION: Linux Kernel is vulnerable to a buffer overflow, caused by improper bounds checking by the snd_ctl_add() and snd_ctl_remove_numid_conflict() functions. By sending an overly long argument, a local attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. CVSS Base Score: 4.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/94100 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-6410 DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by an error when processing indirect ICBs. A local attacker could exploit this vulnerability to cause the system to enter into an infinite loop. CVSS Base Score: 4.9 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/95963 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:C) CVEID: CVE-2014-3182 DESCRIPTION: Linux Kernel is vulnerable to a buffer overflow, caused by improper bounds checking by the logi_dj_recv_destroy_djhid_device function. By sending an overly long string, a local attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. CVSS Base Score: 7.2 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/95928 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:C) CVEID: CVE-2014-7283 DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by an error in the xfs_da3_fixhashpath() function when ordering directory hashes. By creating directories, a local attacker could exploit this vulnerability to cause a kernel panic. CVSS Base Score: 4.9 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/96836 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:C) CVEID: CVE-2014-7826 DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by an out-of-bounds memory access error in trace_syscalls.c. A local attacker could exploit this vulnerability to cause the system to crash. CVSS Base Score: 4.9 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/98556 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:C) CVEID: CVE-2014-0181 DESCRIPTION: Linux Kernel could allow a local attacker to bypass security restrictions, caused by the failure to provide a mechanism for authorizing socket operations by the Netlink implementation. By using a Netlink socket for the stdout or stderr of a setuid program, an attacker could exploit this vulnerability to bypass restrictions and modify network configurations. CVSS Base Score: 2.1 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/92890 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:N/I:P/A:N) CVEID: CVE-2014-4667 DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by an error in the sctp_association_free() function when handling a COOKIE_ECHO chunk in an SCTP packet. By sending a specially-crafted SCTP packet, an attacker could exploit this vulnerability to block connections to the sctp server. CVSS Base Score: 5 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/94106 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P) CVEID: CVE-2014-6416 DESCRIPTION: Linux Kernel libceph is vulnerable to a buffer overflow, caused by improper bounds checking by the auth ticket size. By sending an overly large amount of tickets, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause a denial of service. CVSS Base Score: 7.5 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/95964 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-3183 DESCRIPTION: Linux Kernel is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by the logi_dj_ll_raw_request() function. By sending an overly long string, a local attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. CVSS Base Score: 7.2 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/95929 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:C) CVEID: CVE-2014-7970 DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by an error in the VFS filesystem pivot_root() function. A local attacker could exploit this vulnerability to cause the system to crash. CVSS Base Score: 4.9 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/96921 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:C) CVEID: CVE-2014-3687 DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by an error when sctp stack receives duplicate ASCONF chunks. A remote attacker could exploit this vulnerability to cause a kernel panic. CVSS Base Score: 7.8 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/98310 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:C) CVEID: CVE-2014-4652 DESCRIPTION: Linux Kernel could allow a local attacker to obtain sensitive information, caused by a race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function. By leveraging /dev/snd/controlCX access, an attacker could exploit this vulnerability to obtain kernel memory. CVSS Base Score: 4.7 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/94412 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:M/Au:N/C:C/I:N/A:N) CVEID: CVE-2014-0206 DESCRIPTION: Linux Kernel could allow a local attacker to obtain sensitive information, caused by the failure to properly sanitize AIO ring head by the aio_read_events_ring() function. An attacker could exploit this vulnerability to obtain kernel information. CVSS Base Score: 4.9 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93944 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:C/I:N/A:N) CVEID: CVE-2014-6417 DESCRIPTION: Linux Kernel libceph is vulnerable to a denial of service, caused by the improper handling of kmalloc failures. An attacker could exploit this vulnerability to cause a denial of service. CVSS Base Score: 5 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/95965 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P) CVEID: CVE-2014-3184 DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by multiple off-by-one errors in report descriptor size checking. By sending an overly long string, a local attacker could exploit this vulnerability to cause the application to crash. CVSS Base Score: 4.9 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/95930 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:C) CVEID: CVE-2014-7975 DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by an error in do_umount function in fs/namespace.c. A local attacker could exploit this vulnerability using a umount call to cause the file system to become inaccessible. CVSS Base Score: 4.9 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/96994 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:C) CVEID: CVE-2014-3673 DESCRIPTION: Linux Kernel is vulnerable to a denial of service. By sending specially-crafted ASCONF chunks to SCTP, a remote attacker could exploit this vulnerability to cause a kernel panic. CVSS Base Score: 7.8 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/98489 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:C) CVEID: CVE-2014-4653 DESCRIPTION: Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a use-after-free error in the sound/core/control.c. An attacker could exploit this vulnerability to execute arbitrary code on the system. CVSS Base Score: 4.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/94099 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-4171 DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by an error in the shmem_fallocate() function. A local attacker could exploit this vulnerability to cause the kernel to hang. CVSS Base Score: 4.9 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93870 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:C) CVEID: CVE-2014-6418 DESCRIPTION: Linux Kernel libceph is vulnerable to a denial of service, caused by missing validation of the auth reply. An attacker could exploit this vulnerability to cause a denial of service. CVSS Base Score: 5 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/95966 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P) CVEID: CVE-2014-3185 DESCRIPTION: Linux Kernel is vulnerable to a buffer overflow, caused by improper bounds checking by the command_port_read_callback function within the whiteheat USB driver. By sending an overly long string, a local attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. CVSS Base Score: 7.2 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/95931 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:C) CVEID: CVE-2014-8709 DESCRIPTION: Linux Kernel could allow a remote attacker to obtain sensitive information, caused by the failure to properly maintain a certain tail pointer by the ieee80211_fragment function. By reading packets, an attacker could exploit this vulnerability to obtain sensitive information. CVSS Base Score: 5 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/98922 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N) CVEID: CVE-2014-8884 DESCRIPTION: Linux Kernel is vulnerable to a buffer overflow, caused by improper bounds checking by the ttusbdecfe.c DVB-T usb driver. By sending an overly long argument, a local attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. CVSS Base Score: 4.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/98690 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-4654 DESCRIPTION: Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a use-after-free error in the snd_ctl_elem_add() function. An attacker could exploit this vulnerability to execute arbitrary code on the system. CVSS Base Score: 4.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/94098 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-4943 DESCRIPTION: Linux Kernel could allow a local attacker to gain elevated privileges on the system, caused by an error in the pppol2tp_setsockopt() and pppol2tp_getsockopt() functions when CONFIG_PPPOL2TP is enabled. An attacker could exploit this vulnerability to gain root privileges on the system. CVSS Base Score: 6.9 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/94665 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:M/Au:N/C:C/I:C/A:C) CVEID: CVE-2014-7145 DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a NULL pointer dereference in SMB2_tcon. A remote attacker could exploit this vulnerability to cause the kernel to crash. CVSS Base Score: 7.8 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/96025 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:C) CVEID: CVE-2014-3186 DESCRIPTION: Linux Kernel is vulnerable to a buffer overflow, caused by improper bounds checking by the PicoLCD HID device driver. By sending an overly long string, a local attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. CVSS Base Score: 7.2 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/95932 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:C) CVEID: CVE-2014-8369 DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by an incomplete fix related to an incorrect third parameter of kvm_unpin_pages() when called from kvm_iommu_map_pages(). A remote attacker from within the local network could exploit this vulnerability to corrupt the OS memory and cause a denial of service. CVSS Base Score: 3.3 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/97755 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:A/AC:L/Au:N/C:N/I:N/A:P) CVEID: CVE-2014-7841 DESCRIPTION: Linux Kernel is vulnerable to a denial of service, caused by a NULL pointer dereference in the SCTP server. By sending a specially-crafted SCTP packet, an attacker could exploit this vulnerability to cause the system to crash. CVSS Base Score: 7.1 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/98659 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:C) Effective CVSS Score: 7.80 Affected Products and Versions PowerKVM 2.1 Remediation/Fixes Fix is made available via Fix Central https://ibm.biz/BdEnT8 in fix pack "ibm-powerkvm-updates-2.1.1.0-33.0" and all later fix packs. See the README at https://ibm.biz/BdEnTL for prerequisite fixes and instructions. Workarounds and Mitigations None Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. References Complete CVSS Guide On-line Calculator V2 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Acknowledgement None Change History January 8, 2015 - Original Version Published January 15, 2015 - Updated summary and CVSS details January 19, 2014 - Address the deficiency that the summary was not a complete sentence. *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - --------------------------------------------------------------------------- Security Bulletin: PowerKVM wget Vulnerability - CVE-2014-4877 Document information More support for: PowerKVM Software version: 2.1 Operating system(s): Linux Software edition: KVM Reference #: T1021954 Modified date: 2015-01-20 Security Bulletin Summary In PowerKVM, GNU Wget could allow a remote attacker to launch a symlink attack. Vulnerability Details CVEID: CVE-2014-4877 DESCRIPTION: GNU Wget could allow a remote attacker to launch a symlink attack. Temporary files are created insecurely. A remote attacker could exploit this vulnerability by creating a symbolic link from a temporary file to various files on the system, which could allow the attacker to overwrite arbitrary files and possibly execute arbitrary code on the system. CVSS Base Score: 6.8 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/97778 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P) Effective CVSS Score: 6.80 Affected Products and Versions PowerKVM 2.1 Remediation/Fixes Fix is made available via Fix Central https://ibm.biz/BdEnT8 in fix pack "ibm-powerkvm-updates-2.1.1.0-33.0" and all later fix packs. See the README at https://ibm.biz/BdEnTL for prerequisite fixes and instructions. Workarounds and Mitigations none Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. References Complete CVSS Guide On-line Calculator V2 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Acknowledgement none Change History January 8, 2015 - Original Version Published January 15, 2015 - Updated summary and CVSS details *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - --------------------------------------------------------------------------- Security Bulletin: PowerKVM libxml2 Vulnerability- CVE-2014-3660 Document information More support for: PowerKVM Software version: 2.1 Operating system(s): Linux Software edition: KVM Reference #: T1021951 Modified date: 2015-01-20 Security Bulletin Summary PowerKVM has a vulnerability to libxml2 variantsof the billion laugh DOS attacks. Vulnerability Details CVEID: CVE-2014-3660 DESCRIPTION: Libxml2 is vulnerable to a denial of service, caused by the expansion of recursive entities. A remote attacker could exploit this vulnerability using a specially-crafted XML document processed by an application using libxml2 to consume all available CPU resources. CVSS Base Score: 5 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/97656 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P) Effective CVSS Score: 5.00 Affected Products and Versions PowerKVM 2.1 Remediation/Fixes Fix is made available via Fix Central https://ibm.biz/BdEnT8 in fix pack "ibm-powerkvm-updates-2.1.1.0-33.0" and all later fix packs. See the README at https://ibm.biz/BdEnTL for prerequisite fixes and instructions. Workarounds and Mitigations none Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. References Complete CVSS Guide On-line Calculator V2 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Acknowledgement none Change History January 8, 2015 - Original Version Published January 15, 2015 - Updated summary and CVSS details *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - ---------------------------------------------------------------------------- Security Bulletin: PowerKVM libksba Vulnerability - CVE-2014-9087 Document information More support for: PowerKVM Software version: 2.1 Operating system(s): Linux Software edition: KVM Reference #: T1021952 Modified date: 2015-01-20 Security Bulletin Summary Libksba in PowerKVM is vulnerable to a buffer overflow. Vulnerability Details CVEID: CVE-2014-9087 DESCRIPTION: Libksba is vulnerable to a buffer overflow, caused by improper bounds checking by the ksba_oid_to_str() function. By sending a specially-crafted S/MIME message or ECC based OpenPGP data, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash CVSS Base Score: 7.5 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/98935 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Affected Products and Versions PowerKVM 2.1 Remediation/Fixes Fix is made available via Fix Central https://ibm.biz/BdEnT8 in fix pack "ibm-powerkvm-updates-2.1.1.0-33.0" and all later fix packs. See the README at https://ibm.biz/BdEnTL for prerequisite fixes and instructions. Workarounds and Mitigations none Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. References Complete CVSS Guide On-line Calculator V2 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Acknowledgement none Change History January 8, 2015 - Original Version Published January 15, 2015 - Updated summary and CVSS details *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - ---------------------------------------------------------------------------- Security Bulletin: PowerKVM Vulnerability - Python CGIHTTPServer module Document information More support for: PowerKVM Software version: 2.1 Operating system(s): Linux Software edition: KVM Reference #: T1021950 Modified date: 2015-01-20 Security Bulletin Summary PowerKVM CGIHTTPServer module does not properly handle URL-encoded path separators in URLs. Vulnerability Details CVEID: CVE-2014-4650 DESCRIPTION: Python CGIHTTPServer module could allow a remote attacker to obtain sensitive information, caused by the failure to properly handle URL-encoded path separators in URLs. An attacker could exploit this vulnerability to obtain the source code of CGI scripts. CVSS Base Score: 5 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93932 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N) Effective CVSS Score: 5.00 Affected Products and Versions PowerKVM 2.1 Remediation/Fixes Fix is made available via Fix Central https://ibm.biz/BdEnT8 in fix pack "ibm-powerkvm-updates-2.1.1.0-33.0" and all later fix packs. See the README at https://ibm.biz/BdEnTL for prerequisite fixes and instructions. Workarounds and Mitigations none Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. References Complete CVSS Guide On-line Calculator V2 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Acknowledgement none Change History January 8, 2015 - Original Version Published January 15, 2015 - Updated summary and CVSS details *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - ----------------------------------------------------------------------------- Security Bulletin: PowerKVM libvirt Vulnerability: CVE-2014-7823 Document information More support for: PowerKVM Software version: 2.1 Operating system(s): Linux Software edition: KVM Reference #: T1021963 Modified date: 2015-01-20 Security Bulletin Summary PowerKVM has a libvirt remote vulnerability to obtain the VNC password Vulnerability Details CVEID: CVE-2014-7823 DESCRIPTION: Libvirt could allow a remote attacker to obtain sensitive information. By leveraging the virDomainGetXMLDesc API with the VIR_DOMAIN_XML_MIGRATABLE flag added, a remote attacker could exploit this vulnerability to obtain the VNC password. CVSS Base Score: 5 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/98807 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N) Effective CVSS Score: 5.00 Affected Products and Versions PowerKVM 2.1 Remediation/Fixes Fix is made available via Fix Central https://ibm.biz/BdEnT8 in fix pack "ibm-powerkvm-updates-2.1.1.0-33.0" and all later fix packs. See the README at https://ibm.biz/BdEnTL for prerequisite fixes and instructions. Workarounds and Mitigations none Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. References Complete CVSS Guide On-line Calculator V2 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Acknowledgement none Change History January 8, 2015 - Original Version Published January 15, 2015 - Updated summary and CVSS details *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - ------------------------------------------------------------------------- Security Bulletin: PowerKVM grub2 vulnerability: CVE-2014-4607 Document information More support for: PowerKVM Software version: 2.1 Operating system(s): Linux Software edition: KVM Reference #: T1021958 Modified date: 2015-01-20 Security Bulletin Summary In PowerKVM grub2, Oberhumer LZO could allow a remote attacker to execute arbitrary code on the system Vulnerability Details CVEID: CVE-2014-4607 DESCRIPTION: Oberhumer LZO could allow a remote attacker to execute arbitrary code on the system, caused by an integer overflow in the lzo1x_decompress_safe() function when processing zero bytes. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service. CVSS Base Score: 7.5 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/94014 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Effective CVSS Score: 7.50 Affected Products and Versions PowerKVM 2.1 Remediation/Fixes Fix is made available via Fix Central https://ibm.biz/BdEnT8 in fix pack "ibm-powerkvm-updates-2.1.1.0-33.0" and all later fix packs. See the README at https://ibm.biz/BdEnTL for prerequisite fixes and instructions. Workarounds and Mitigations none Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. References Complete CVSS Guide On-line Calculator V2 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Acknowledgement none Change History January 8, 2015 - Original Version Published January 15, 2015 - Updated summary and CVSS details *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - -------------------------------------------------------------------------- Security Bulletin: PowerKVM Qemu Cirrus Driver Vulnerability - CVE-2014-8106 Document information More support for: PowerKVM Software version: 2.1 Operating system(s): Linux Software edition: KVM Reference #: T1021949 Modified date: 2015-01-20 Security Bulletin Summary PowerKVM has a Qemu Security bypass risk due to improper Cirrus driver blit region checks. Vulnerability Details CVEID: CVE-2014-8106 DESCRIPTION: QEMU could allow a remote attacker bypass security restrictions, caused by improper Cirrus blit region checks within cirrus_vga.c. An attacker could exploit this vulnerability to write outside of vram allocated buffer boundaries and into qemu address space on the host and gain elevated privileges on the system. CVSS Base Score: 5 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/99126 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N) Affected Products and Versions PowerKVM 2.1 Remediation/Fixes Fix is made available via Fix Central https://ibm.biz/BdEnT8 in fix pack "ibm-powerkvm-updates-2.1.1.0-33.0" and all later fix packs. See the README at https://ibm.biz/BdEnTL for prerequisite fixes and instructions. Workarounds and Mitigations None Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. References Complete CVSS Guide On-line Calculator V2 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Change History January 8, 2015 - Original Version Published January 15, 2015 - Updated summary and CVSS details *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - -------------------------------------------------------------------------- Security Bulletin: PowerKVM D-Bus vulnerabilities: Multiple CVEs Document information More support for: PowerKVM Software version: 2.1 Operating system(s): Linux Software edition: KVM Reference #: T1021955 Modified date: 2015-01-20 Security Bulletin Summary PowerKVM has multiple D-Bus vulnerabilities. Vulnerability Details CVEID: CVE-2014-7824 DESCRIPTION: D-Bus is vulnerable to a denial of service, caused by an incomplete fix related to an error in the dbus-daemon. By sending an excessive number of file descriptors, a local attacker could exploit this vulnerability to cause the dbus-daemon to reach the RLIMIT_NOFILE and cause a denial of service. CVSS Base Score: 2.1 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/98576 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:P) CVEID: CVE-2014-3635 DESCRIPTION: D-Bus is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by the dbus-daemon. By sending an overly long D-Bus message, a local attacker could overflow a buffer and execute arbitrary code on the system or cause the dbus-daemon to crash. CVSS Base Score: 4.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/96006 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-3636 DESCRIPTION: D-Bus is vulnerable to a denial of service, caused by an error in the dbus-daemon. By sending an excessive number of file descriptors, a local attacker could exploit this vulnerability to cause the dbus-daemon to reach the RLIMIT_NOFILE and cause a denial of service. CVSS Base Score: 2.1 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/96007 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:P) CVEID: CVE-2014-3637 DESCRIPTION: D-Bus is vulnerable to a denial of service, caused by an error related to the attachment of a file descriptor to a D-bus message. By sending a specially-crafted message using the dbus-daemon, a local attacker could exploit this vulnerability to kill processes and cause a denial of service. CVSS Base Score: 2.1 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/96008 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:P) CVEID: CVE-2014-3639 DESCRIPTION: D-Bus is vulnerable to a denial of service, caused by an error related to incomplete connections. By making repeated connection attempts, a local attacker could exploit this vulnerability to cause a denial of service. CVSS Base Score: 2.1 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/96010 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:P) CVEID: CVE-2014-3638 DESCRIPTION: D-Bus is vulnerable to a denial of service, caused by an error related to method call replies. By sending the maximum number of parallel method calls, a local attacker could exploit this vulnerability to cause a denial of service. CVSS Base Score: 2.1 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/96009 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:P) Effective CVSS Score: 4.60 Affected Products and Versions PowerKVM 2.1 Remediation/Fixes Fix is made available via Fix Central https://ibm.biz/BdEnT8 in the service pack "2.1.1 (SP1)" and all later fixes. See the README at https://ibm.biz/BdEnTL for prerequisite fixes and instructions. Workarounds and Mitigations none Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. References Complete CVSS Guide On-line Calculator V2 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Acknowledgement none Change History January 8, 2015 - Original Version Published January 9, 2015 - Moved out to SP1 January 15, 2015 - Updated summary and CVSS details *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - --------------------------------------------------------------------------- Security Bulletin: PowerKVM tcpdump DoS vulnerabilities: CVE-2014-8767 and CVE-2014-8769 Document information More support for: PowerKVM Software version: 2.1 Operating system(s): Linux Software edition: KVM Reference #: T1021953 Modified date: 2015-01-20 Security Bulletin Summary PowerKVM tcpdump has denial of service (DoS) vulnerabilities. Vulnerability Details CVEID: CVE-2014-8767 DESCRIPTION: tcpdump is vulnerable to a denial of service, caused by an error in the olsr_print() function. By sending specially-crafted Optimized Link State Routing (OLSR) protocol traffic, a remote attacker could exploit this vulnerability to cause the application to crash. CVSS Base Score: 5 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/98765 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P) CVEID: CVE-2014-8769 DESCRIPTION: tcpdump is vulnerable to a denial of service, caused by the improper handling of input by the application decoder for the Ad hoc On-Demand Distance Vector (AODV) protocol. By sending specially-crafted data, a remote attacker could exploit this vulnerability to cause the application to crash. CVSS Base Score: 5 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/98764 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P) Effective CVSS Score: 5.00 Affected Products and Versions PowerKVM 2.1 Remediation/Fixes Fix is made available via Fix Central https://ibm.biz/BdEnT8 in fix pack "ibm-powerkvm-updates-2.1.1.0-33.0" and all later fix packs. See the README at https://ibm.biz/BdEnTL for prerequisite fixes and instructions. Workarounds and Mitigations none Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. References Complete CVSS Guide On-line Calculator V2 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Acknowledgement none Change History January 8, 2015 - Original Version Published January 15, 2015 - Updated summary and CVSS details *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - --------------------------------------------------------------------------- Security Bulletin: PowerKVM Qemu Vulnerabilities: Multiple CVEs Document information More support for: PowerKVM Software version: 2.1 Operating system(s): Linux Software edition: KVM Reference #: T1021956 Modified date: 2015-01-20 Security Bulletin Summary There are multiple vulnerabilities in Qemu code used in IBM PowerKVM. Vulnerability Details CVEID: CVE-2013-4148 DESCRIPTION: QEMU could allow a local attacker to execute arbitrary code on the system, caused by a signedness error in virtio-net.h. An attacker could exploit this vulnerability to execute arbitrary code on the system. CVSS Base Score: 4.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93223 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2013-4530 DESCRIPTION: QEMU is vulnerable to a buffer overflow, caused by improper bounds checking by pl022.c. By sending an overly long argument, a local attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. CVSS Base Score: 4.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93230 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2013-4538 DESCRIPTION: QEMU could allow a local attacker to execute arbitrary code on the system, caused by an array indexing error in the ssd0323_load() function. An attacker could exploit this vulnerability to execute arbitrary code on the system. CVSS Base Score: 4.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93237 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-7815 DESCRIPTION: QEMU could allow a local attacker to execute arbitrary code on the system, caused by an array indexing error in the ssd0323_load() function. An attacker could exploit this vulnerability to execute arbitrary code on the system. CVSS Base Score: 5.2 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/98577 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:A/AC:M/Au:S/C:N/I:N/A:C) CVEID: CVE-2013-4150 DESCRIPTION: QEMU is vulnerable to a buffer overflow, caused by improper bounds checking by the virtio_net_load() function. By sending an overly long argument, a local attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. CVSS Base Score: 4.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93225 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2013-4531 DESCRIPTION: QEMU is vulnerable to a buffer overflow, caused by improper bounds checking by the cpu_post_load() function. By sending an overly long argument, a local attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. CVSS Base Score: 4.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93231 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2013-4539 DESCRIPTION: QEMU could allow a local attacker to execute arbitrary code on the system, caused by an array indexing error in the tsc210x_load() function. An attacker could exploit this vulnerability to execute arbitrary code on the system. CVSS Base Score: 4.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93238 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2013-4151 DESCRIPTION: QEMU could allow a local attacker to execute arbitrary code on the system, caused by an out-of-bounds write error in the virtio_load() function. An attacker could exploit this vulnerability to execute arbitrary code on the system. CVSS Base Score: 4.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93226 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2013-6399 DESCRIPTION: QEMU could allow a local attacker to execute arbitrary code on the system, caused by an array indexing error in the virtio_load() function. An attacker could exploit this vulnerability to execute arbitrary code on the system. CVSS Base Score: 4.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93241 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2013-4540 DESCRIPTION: QEMU is vulnerable to a buffer overflow, caused by improper bounds checking by the scoop_gpio_handler_update() function. By sending an overly long argument, a local attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. CVSS Base Score: 4.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93239 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-5388 DESCRIPTION: QEMU could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds access error in ACPI PCI hotplug interface. An attacker could exploit this vulnerability to corrupt QEMU process memory and obtain sensitive information. CVSS Base Score: 7.5 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/95419 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2013-4526 DESCRIPTION: QEMU could allow a local attacker to execute arbitrary code on the system, caused by an aerror in ahci.c. An attacker could exploit this vulnerability to execute arbitrary code on the system. CVSS Base Score: 4.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93227 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2013-4535 DESCRIPTION: QEMU could allow a local attacker to execute arbitrary code on the system, caused by an error in the virtqueue_map_sg() function. An attacker could exploit this vulnerability to execute arbitrary code on the system. CVSS Base Score: 4.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93234 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2013-4542 DESCRIPTION: QEMU is vulnerable to a buffer overflow, caused by improper bounds checking by the virtio_scsi_load_request() function. By sending an overly long argument, a local attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. CVSS Base Score: 4.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93240 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2013-4527 DESCRIPTION: QEMU is vulnerable to a buffer overflow, caused by improper bounds checking by hpet.c. By sending an overly long argument, a local attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. CVSS Base Score: 4.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93228 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2013-4536 DESCRIPTION: QEMU could allow a local attacker to execute arbitrary code on the system, caused by an error in virtio.c. An attacker could exploit this vulnerability to execute arbitrary code on the system. CVSS Base Score: 4.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93235 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-3640 DESCRIPTION: QEMU is vulnerable to a denial of service, caused by a NULL pointer dereference in the sosendto() function. A local attacker could exploit this vulnerability to cause a denial of service. CVSS Base Score: 2.1 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/96930 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:P) CVEID: CVE-2013-4529 DESCRIPTION: QEMU is vulnerable to a buffer overflow, caused by improper bounds checking by pcie_aer.c. By sending an overly long argument, a local attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. CVSS Base Score: 4.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93229 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2013-4533 DESCRIPTION: QEMU is vulnerable to a buffer overflow, caused by improper bounds checking by the pxa2xx_ssp_load() function. By sending an overly long argument, a local attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. CVSS Base Score: 4.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93232 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-3689 DESCRIPTION: QEMU could allow a remote attacker from within the local network to bypass security restrictions, caused by the improper validation of parameters by the vmware-vga driver within the rectangle handling functionality. An attacker could exploit this vulnerability to write into qemu address space on the host and gain elevated privileges on the system. CVSS Base Score: 4 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/98578 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:A/AC:H/Au:S/C:P/I:P/A:P) Affected Products and Versions PowerKVM 2.1 Remediation/Fixes Fix is made available via Fix Central https://ibm.biz/BdEnT8 in fix pack "ibm-powerkvm-updates-2.1.1.0-33.0" and all later fix packs. See the README at https://ibm.biz/BdEnTL for prerequisite fixes and instructions. Workarounds and Mitigations none Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. References Complete CVSS Guide On-line Calculator V2 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Acknowledgement none Change History January 8, 2015 - Original Version Published January 15, 2015 - Updated Summary and corrected the detailed CVSS description *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVL8ZlhLndAQH1ShLAQJwuQ//fgV3l62H5vNXxpgOB6VQBEwWR6CFrOge rQjHz9mvrPR7lJgw/a+budDzoDdFq1P+Wtp6dUW5mqs8TQNTtdr4CLTTPJ9H7SvN dPdtmbEPoJ3ksA/iyiThLIyD4gPPRmBOu0Y5/bRrBCgb8EDgahfOlp7ByIL3QDZk saSQ9/Op/lvgMw6kSjk5X3k+oau9k1/fq+s7HhakbOa9cCERcMVgtvBPHSCP4OjK GF5kCWWhby6xcKdeRjMC0YXrksukApS+RIa07vTPF3D5m4VnGN5HdniKunEyYeil ah2aBKncbzFbu1Ux0OHs1QRRbyHiioq+CBTg/o4wsSjGmGOywQ9TlqoMvbexOWLf KfNpd5fq9+V5h4WJe3lpThUdifywhxxlKPcnATYxdmwU1SPkffYqa1NzSMvCly/b JquqF2oUaEWTAKTc0vBymLoc4alXDYIDSnfp8pRf60R5mz4ISfdr2TNqToqEBbsV J/5FFJCJjA92jJGnYQHLxAhGeukAzeWDcr9cqGiAQs+119ucK/9iLLJaWekJ0oBa FcXey6N5r9cPONYN4Ofrp5ju0yjsoGmXarfTVnrBqVzfHDESwUqAhufyrLT4be3t LqiEne8+3HpYoDU/rPcgxdgD5BtH1TQnpzf20fvhGwg8+HFiTNelD7naFzKvfPDi 8VD8P7+T0FQ= =auUl -----END PGP SIGNATURE-----