SB2023121229 - Multiple vulnerabilities in IBM Storage Defender - Data Protect



SB2023121229 - Multiple vulnerabilities in IBM Storage Defender - Data Protect

Published: December 12, 2023 Updated: October 25, 2024

Security Bulletin ID SB2023121229
Severity
High
Patch available
YES
Number of vulnerabilities 20
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 10% Medium 30% Low 60%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 20 secuirty vulnerabilities.


1) Use-after-free (CVE-ID: CVE-2023-32233)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in Netfilter nf_tables when processing batch requests. A local user can trigger a use-after-free error and execute arbitrary code with root privileges.


2) Resource exhaustion (CVE-ID: CVE-2023-3341)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources when handling control channel messages . A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.


3) Out-of-bounds write (CVE-ID: CVE-2020-22218)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to usage of an uninitialized value within the _libssh2_transport_read() function in transport.c. A remote attacker can pass specially crafted input to the application, trigger memory corruption and perform a denial of service (DoS) attack.


4) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2023-28155)

The disclosed vulnerability allows a remote attacker to perform SSRF attacks.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.

Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.


5) Incorrect default permissions (CVE-ID: CVE-2023-24626)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to missing permissions checks in socket.c, which allows a local user to send a privileged SIGHUP signal to any PID, causing a denial of service or disruption of the target process.


6) Heap-based buffer overflow (CVE-ID: CVE-2014-8146)

The vulnerability allows a remote attacker to cause Dos condition or execute arbitrary code on the target system.

The vulnerability exists due to heap-based buffer overflow when the resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C does not properly track directionally isolated pieces of text. A remote unauthenticated attacker can supply specially crafted text file, trigger memory corruption and cause the service to crash or execute arbitrary code with elevated privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


7) Improper Authentication (CVE-ID: CVE-2023-32360)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to missing authentication in CUPS. A remote attacker can access recently printed documents.


8) Improper input validation (CVE-ID: CVE-2023-22045)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The vulnerability exists due to improper input validation within the Hotspot component in Oracle GraalVM for JDK. A remote non-authenticated attacker can exploit this vulnerability to gain access to sensitive information.


9) Improper input validation (CVE-ID: CVE-2023-22049)

The vulnerability allows a remote non-authenticated attacker to manipulate data.

The vulnerability exists due to improper input validation within the Libraries component in Oracle GraalVM for JDK. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.


10) Out-of-bounds write (CVE-ID: CVE-2023-35001)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the nft_byteorder() function. A local user can trigger an out-of-bounds write and execute arbitrary code on the target system.


11) Use-after-free (CVE-ID: CVE-2023-20593)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in AMD Zen2 processors. A local user can trigger a use-after-free error and execute arbitrary code on the system.

Note, the vulnerability was dubbed Zenbleed.


12) Out-of-bounds write (CVE-ID: CVE-2023-35788)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the fl_set_geneve_opt() function in net/sched/cls_flower.c in Linux kernel. A local user can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.


13) Prototype pollution (CVE-ID: CVE-2023-26136)

The vulnerability allows a remote attacker to execute arbitrary JavaScript code.

The vulnerability exists due to improper input validation. A remote attacker can pass specially crafted input to the application and perform prototype pollution, which can result in information disclosure or data manipulation.


14) Inefficient regular expression complexity (CVE-ID: CVE-2023-26115)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient input validation when processing untrusted input with a regular expressions. A remote attacker can pass specially crafted data to the application and perform regular expression denial of service (ReDos) attack.


15) Buffer overflow (CVE-ID: CVE-2023-23457)

The vulnerability allows a local user to perform a denial of service attack.

The vulnerability exists due to a boundary error in UPX in PackLinuxElf64::invert_pt_dynamic() in p_lx_elf.cpp. A local user can create a specially crafted data, trick the victim into opening it, trigger memory corruption and perform a denial of service attack.


16) Out-of-bounds read (CVE-ID: CVE-2022-26280)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition when processing ZIP files in zipx_lzma_alone_init. A remote attacker can create a specially crafted .zip archive, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


17) Side-channel attack (CVE-ID: CVE-2018-5407)

The vulnerability allows a physical attacker to obtain potentially sensitive information.

The vulnerability exists due to due to execution of engine sharing on SMT (e.g.Hyper-Threading) architectures when improper handling of information by the processor. A physical attacker can construct a timing side channel to hijack information from processes that are running in the same core.

Note: the vulnerability has been dubbed as PortSmash microarchitecture bug.


18) Cross-site scripting (CVE-ID: CVE-2018-20677)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists in the affix configuration target property due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


19) Heap-based buffer over-read (CVE-ID: CVE-2017-14939)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists in the decode_line_info in dwarf2.c source code and is due to improper memory allocation. A remote attacker can send a specially crafted ELF file, trigger heap-based buffer over-read and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.


20) Infinite loop (CVE-ID: CVE-2023-20197)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop in the HFS+ file parser. A remote attacker can consume all available system resources and cause denial of service conditions.


Remediation

Install update from vendor's website.