SB2025100342 - Multiple vulnerabilities in IBM DS8900F and DS8A00 Hardware Management Console (HMC) 



SB2025100342 - Multiple vulnerabilities in IBM DS8900F and DS8A00 Hardware Management Console (HMC)

Published: October 3, 2025

Security Bulletin ID SB2025100342
Severity
Critical
Patch available
YES
Number of vulnerabilities 15
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 7% High 33% Medium 40% Low 20%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 15 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2025-46421)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to libsoup includes authorization headers into requests when handling HTTP redirects. A remote attacker can gain access to credentials intended for a different website.


2) Out-of-bounds read (CVE-ID: CVE-2024-37371)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition when handling GSS message token. A remote attacker can send specially crafted token to the application, trigger an out-of-bounds read error and read contents of memory on the system.


3) Input validation error (CVE-ID: CVE-2024-37370)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.


4) Memory corruption (CVE-ID: CVE-2017-9047)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the xmlSnprintfElementContent function of XMLSoft libxml2 due to improper memory handling by the valid.c source code. A remote attacker can send a specially crafted XML file, trigger memory corruption and cause the service to crash.

Successful exploitation of the vulnerability results in denial of service.


5) Stack-based buffer overflow (CVE-ID: CVE-2025-24928)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the xmlSnprintfElements() function in valid.c. A remote attacker can pass specially crafted XML data to the application, trigger a stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


6) Use-after-free (CVE-ID: CVE-2024-56171)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error within the xmlSchemaIDCFillNodeTables() and xmlSchemaBubbleIDCNodeTables() functions in xmlschemas.c. A remote attacker can pass specially crafted XML document to the application, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


7) Out-of-bounds write (CVE-ID: CVE-2025-27363)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input. A remote attacker can pass a specially crafted font to the application that is using an affected version of the library, trigger an out-of-bounds write and execute arbitrary code on the target system.


8) Memory leak (CVE-ID: CVE-2025-46420)

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak within the soup_header_parse_quality_list() function. A remote attacker can force the application to leak memory and perform denial of service attack.


9) NULL pointer dereference (CVE-ID: CVE-2025-32913)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in the soup_message_headers_get_content_disposition() function. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.


10) Use-after-free (CVE-ID: CVE-2025-32911)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error within the soup_message_headers_get_content_disposition(). A remote attacker can trick the victim into visiting a specially crafted website and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


11) Out-of-bounds read (CVE-ID: CVE-2025-32906)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in soup_headers_parse_request() function. A remote attacker can trick the victim into visiting a specially crafted website, trigger an out-of-bounds read error and read contents of memory on the system.


12) Buffer Over-read (CVE-ID: CVE-2025-32053)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to a boundary error within the sniff_feed_or_html() and skip_insignificant_space() functions when parsing server HTTP response. A remote attacker can trick the victim into visiting a specially crafted website and read parts of the heap memory.


13) Buffer Over-read (CVE-ID: CVE-2025-32052)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to a boundary error within the sniff_unknown() function when handling server HTTP response. A remote attacker can trick the victim into visiting a specially crafted website and read parts of the heap memory.

14) Buffer Over-read (CVE-ID: CVE-2025-32050)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to a boundary error within the append_param_quoted() function when handling server HTTP response. A remote attacker can trick the victim into visiting a specially crafted website and read parts of the heap memory.

15) Stack-based buffer overflow (CVE-ID: CVE-2024-8176)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when handling XML content. A remote attacker can pass specially crafted XML content to the application, trigger a stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.