IBM Support

Security Bulletin: Vulnerability in OSPFv2 Routing Protocol Used in IBM i Operating System (CVE-2013-0149 and CVE-2013-5385)

Troubleshooting


Problem

: The OSPFv2 routing protocol specified in RFC 2328 has an ambiguity that can be exploited and allow for traffic to be black-holed and/or redirected. A PTF is provided.

Resolving The Problem


VULNERABILITY DETAILS:


DESCRIPTION:
A potential protocol vulnerability has been identified in the OSPFv2 Layer-3 routing protocol. If an attacker sends a specially crafted OSPFv2 Link State Advertisement (LSA) packet, it may result in the corruption of routing tables. The attack does not require local network access or physical access to the network and is therefore remotely exploitable, but specialized knowledge and techniques are required to execute this attack. A successful exploit will not impact integrity of transmitted data, but the availability of the network may be affected. Moreover, confidentiality of information may be compromised, although the attacker would not have control over what can be accessed.


CVEID: CVE-2013-0149 and CVE-2013-5385
CVSS Base Score: 7.8
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/84112 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:C)


AFFECTED PRODUCTS AND VERSIONS:
IBM i 6.1 and IBM i 7.1 are affected.


REMEDIATION:
The issue can be fixed by applying a PTF to the IBM i OS.

The IBM i PTF numbers are:

V5R4 – Not affected by this vulnerability
6.1 SI50218
7.1 SI50213


Workaround(s):
<None>

Mitigation(s):
<None>

REFERENCES:
· Complete CVSS Guide
· On-line Calculator V2
· CVE-2013-0149
· X-Force Vulnerability Database http://xforce.iss.net/xforce/xfdb/84112

RELATED INFORMATION:
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog


ACKNOWLEDGEMENT
The vulnerability was reported to IBM by Dr. Gabi Nakibly

CHANGE HISTORY
01 August 2013: Original Copy Published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.


Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.




[{"Type":"MASTER","Line of Business":{"code":"LOB57","label":"Power"},"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Product":{"code":"SWG60","label":"IBM i"},"Platform":[{"code":"PF012","label":"IBM i"}],"Version":"6.1.0"}]

Historical Number

677961906

Document Information

Modified date:
18 December 2019

UID

nas8N1010309