IBM Support

Security Bulletin: IBM PureApplication System - Proof of Concept exploit code, which uses a flaw in glibc that can allow a local unprivileged user to gain root on Linux machine

Security Bulletin


Summary

Proof of Concept exploit code, which uses a flaw in glibc that can allow a local unprivileged user to gain root on a Linux machine. This affects virtual machines deployed by IBM PureApplication System using the IBM OS Image for RedHat Linux (version 2.0, 2.0.0.1, 2.0.0.2, 2.0.0.3, 2.0.0.4 and 2.1.0.0).

Vulnerability Details

VULNERABILITY DETAILS


The GNU C Library (glibc) is vulnerable to a heap-based buffer overflow, caused by an off-by-one error in the __gconv_translit_find() function. By setting the CHARSET environment variable to a malicious value, a local attacker could exploit this vulnerability to overflow a buffer and execute arbitrary code on the system with root privileges.

CVE ID: CVE-2014-5119

DESCRIPTION: Proof of Concept exploit code, which uses a flaw in glibc that can allow a local unprivileged user to gain root on Linux machine

CVSS:
CVSS Base Score: 7.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/95044 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:C)

AFFECTED PRODUCTS AND VERSIONS:
  • IBM PureApplication System V1.0 and later
  • IBM PureApplication System V1.1 and later
  • IBM PureApplication System V2.0 and later

  • REMEDIATION:

    A patch for the glibc is provided by the OS vendors. Apply this patch, with the following direction:

    · Run the “yum update glibc” within the deployed vm to upgrade to the latest version of glibc.


    WORKAROUND(S) and MITIGATION(S):
    None

    ACKNOWLEDGEMENT:
    None

    CHANGE HISTORY:
    26 September 2014 - Original Copy Published

    Get Notified about Future Security Bulletins

    References

    Off

    *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

    Disclaimer

    Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

    [{"Product":{"code":"SSM8NY","label":"PureApplication System"},"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Component":"Security","Platform":[{"code":"PF016","label":"Linux"}],"Version":"2.0;1.1.0.4;1.1.0.3;1.1.0.2;1.1.0.1;1.1.0.0;1.0.0.4;1.0.0.3;1.0.0.2;1.0.0.1;1.0","Edition":"","Line of Business":{"code":"","label":""}}]

    Document Information

    Modified date:
    15 June 2018

    UID

    swg21685471