Security Bulletin: IBM Security Network Intrusion Prevention System can be affected by vulnerabilities in Ruby on Rails (CVE-2012-2660, CVE-2012-2694, CVE-2013-0156, CVE-2012-6496, CVE-2012-3424, and CVE-2012-2695)

Technote (FAQ)


Question

Is the Network IPS system affected by Ruby on Rails vulnerabilities?

Answer

IBM Security Network Intrusion Prevention System is affected by multiple vulnerabilities reported in Ruby on Rails. These vulnerabilities include multiple SQL injection, code execution, and denial of service vulnerabilities that could be exploited remotely by an attacker with access to the Local Management Interface (LMI).


Vulnerability Details:

The following information was provided by Ruby on Rails. In the case of IBM Security Network Intrusion Prevention System, the Local Management Interface requires single platform authentication specific to the IPS system, notwithstanding the information in the CVSS vectors specified below. Further for each vulnerability identified below, the vulnerability is remotely exploitable and no specialized knowledge is required.

CVE-2013-0155 identified on the affected version of Ruby on Rails has no impact on the Intrusion Prevention System.


CVE ID: CVE-2012-2660

DESCRIPTION:

A remote attacker could send specially-crafted SQL statements using an unspecified parameter, which could allow the attacker to view, add, modify or delete information in the back-end database.

CVSS Base Score: 7.5
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/76015 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)


CVE ID: CVE-2012-2694

DESCRIPTION: A remote attacker could send specially-crafted SQL statements to Active Record used in conjunction with parameter parsing from Rack via Action Pack, which could allow the attacker to view, add, modify or delete information in the back-end database.

CVSS Base Score: 7.5
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/76255 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)


CVE ID: CVE-2013-0156

DESCRIPTION: Ruby on Rails could allow a remote attacker to execute arbitrary code on the system, caused by multiple errors in the XML parameter parsing code. The XML processor decodes a request as a YAML document or as a Ruby Symbol allowing an attacker to inject SQL commands, inject and execute arbitrary code and cause a denial of service. This will allow the attacker to take full control of the system.

CVSS Base Score: 9.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/81119 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)


CVE ID: CVE-2013-6496

DESCRIPTION: A remote attacker could send specially-crafted SQL statements to the Active Record component which could allow the attacker to view, add, modify or delete information in the back-end database.

CVSS Base Score: 7.5
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/81004 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)



CVE ID: CVE-2012-3424

DESCRIPTION: By sending specially-crafted data to the Action Pack digest authentication (authenticate_or_request_with_http_digest), an attacker could exploit this to cause the system to crash.

CVSS Base Score: 5
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/77240 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)


CVE ID: CVE-2012-2695

DESCRIPTION: A remote attacker could send specially-crafted SQL statements to the Active Record interface using nested query parameters, which could allow the attacker to view, add, modify or delete information in the back-end database.

CVSS Base Score: 7.5
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/76260 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)


AFFECTED PRODUCTS AND VERSIONS:

Products: GX3002, GX4002, GX4004, GX4004-v2, GX5008, GX5008-v2, GX5108, GX5108-v2, GX5208, GX5208-v2, GX6116, GX7412, GX7412-10, GX7412-05, GX7800, GV200, GV1000
Firmware versions: 4.1, 4.2, 4.3, 4.4, 4.5

REMEDIATION:

These fixes are included in firmware 4.6 for the IPS.
The following IBM Threat Fixpacks have the fixes for these vulnerabilities.

· 4.3.0.0-ISS-ProvG-AllModels-System-FP0001 for all IBM Security Network Intrusion Prevention System products at Firmware version 4.3
· 4.4.0.0-ISS-ProvG-AllModels-System-FP0002 for all IBM Security Network Intrusion Prevention System products at Firmware version 4.4
· 4.5.0.0-ISS-ProvG-AllModels-System-FP0002 for all IBM Security Network Intrusion Prevention System products at Firmware version 4.5

IBM Security Network Intrusion Prevention System users on Firmware 4.1 and 4.2 should upgrade to Firmware 4.3, with fixpack 4.3.0.0-ISS-ProvG-AllModels-System-FP0001, or Firmware 4.4, with fixpack 4.4.0.0-ISS-ProvG-AllModels-System-FP0002, or Firmware 4.5, with fixpack 4.5.0.0-ISS-ProvG-AllModels-System-FP0002, or later.


Contact IBM Security Systems Support (http://www-947.ibm.com/support/entry/portal/overview) to upgrade to the above required Fixpacks.

Workaround(s):
None

Mitigation(s):
None

REFERENCES:
· Complete CVSS Guide
· On-line Calculator V2
· CVE-2012-2660
· CVE-2012-6496
· CVE-2012-2694
· CVE-2013-0156
· CVE-2012-0155
· CVE-2012-3424
· CVE-2012-2695


RELATED INFORMATION:
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog


ACKNOWLEDGEMENT
None

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.


Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Rate this page:

(0 users)Average rating

Add comments

Document information


More support for:

IBM Security Network Intrusion Prevention System
General Information

Software version:

4.1, 4.2, 4.3, 4.4, 4.5

Operating system(s):

Firmware

Reference #:

1626255

Modified date:

2013-02-21

Translate my page

Machine Translation

Content navigation