SB20230418193 - Multiple vulnerabilities in IBM Integrated Management Module II (IMM2) for System x, BladeCenter and Flex Systems 



SB20230418193 - Multiple vulnerabilities in IBM Integrated Management Module II (IMM2) for System x, BladeCenter and Flex Systems

Published: April 18, 2023 Updated: February 11, 2026

Security Bulletin ID SB20230418193
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2015-1472)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.


2) Input validation error (CVE-ID: CVE-2013-7423)

The vulnerability allows a remote non-authenticated attacker to corrupt data.

The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.


3) Input validation error (CVE-ID: CVE-2014-7817)

The vulnerability allows a local user to read and manipulate data.

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".


4) Infinite loop (CVE-ID: CVE-2014-9402)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the nss_dns implementation of getnetbyname due to infinite loop when the DNS backend in the Name Service Switch configuration is enabled. A remote attacker can send a positive answer while a network name is being process and cause the service to crash.

Remediation

Install update from vendor's website.