SB2018060802 - Multiple vulnerabilities in IBM Security Network Protection



SB2018060802 - Multiple vulnerabilities in IBM Security Network Protection

Published: June 8, 2018 Updated: June 8, 2018

Security Bulletin ID SB2018060802
Severity
Low
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Use of cryptographically weak PRNG (CVE-ID: CVE-2018-1426)

The vulnerability allows a remote unauthenticated attacker to obtain potentially sensitive information and write arbitrary files on the target system.

The weakness exists due to IBM GSKit duplicates the PRNG state across fork() system calls when multiple ICC instances are loaded which can result in duplicate Session IDs and a risk of duplicate key material. A remote attacker can gain access to potentially sensitive information and write arbitrary files.

2) Integer overflow (CVE-ID: CVE-2018-1427)

The vulnerability allows a local unauthenticated attacker to cause DoS condition on the target system.

The weakness exists due to IBM GSKit contains several environment variables. A local attacker can cause the service to crash.

3) Use of a broken or risky cryptographic algorithm (CVE-ID: CVE-2018-1428)

The vulnerability allows a local unauthenticated attacker to obtain potentially sensitive information on the target system.

The weakness exists due to IBM GSKit uses weaker than expected cryptographic algorithms. A local attacker can gain access to potentially sensitive information.

4) Weak passwords requirements (CVE-ID: CVE-2018-1447)

The vulnerability allows a local unauthenticated attacker to obtain potentially sensitive information on the target system.

The weakness exists due to the GSKit CMS KDB logic fails to salt the hash function resulting in weaker than expected protection of passwords. A weak password may be recovered. A local attacker can gain access to potentially sensitive information.

Remediation

Install update from vendor's website.