IBM Support

Security Bulletin: Vulnerability in libxml2 affects IBM Streams (CVE-2016-3705)

Security Bulletin


Summary

There is a vulnerability in libxml2 that is used by IBM Streams. IBM Streams has addressed this vulnerability.

Vulnerability Details

CVEID: CVE-2016-3705
DESCRIPTION:
libxml2 is vulnerable to a stack-based buffer overflow, caused by an out-of-bounds read of xmlParserEntityCheck() and xmlParseAttValueComplex() functions in parser.c. By persuading a victim to open a specially crafted XML file, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
CVSS Base Score: 6.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/112885 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)

Affected Products and Versions

  • IBM Streams Version 4.1.1.1 and earlier
  • IBM InfoSphere Streams Version 4.0.1.2 and earlier
  • IBM InfoSphere Streams Version 3.2.1.5 and earlier
  • IBM InfoSphere Streams Version 3.1.0.7 and earlier
  • IBM InfoSphere Streams Version 3.0.0.5 and earlier
  • IBM InfoSphere Streams Version 2.0.0.4 and earlier
  • IBM InfoSphere Streams Version 1.2.1.0

Remediation/Fixes

NOTE: Fix Packs are available on IBM Fix Central.

    • Version 4.1.1:
    • Version 4.0.1:
    • Version 3.2.1:
    • Version 3.1.0:
      • Contact IBM Technical Support.
    • Version 3.0.0:
      • Contact IBM Technical Support.
    • Versions 1.2 and 2.0:
      • For version 1.x and 2.x, IBM recommends upgrading to a fixed, supported version/release/platform of the product. Customers who cannot upgrade and need to secure their installation should open a PMR with IBM Technical Support and request assistance securing their InfoSphere Streams system against the vulnerabilities identified in this Security Bulletin.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Change History

22 September 2016: Original version created
05 December 2016: Added links to fix packs

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SSCRJU","label":"IBM Streams"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":"--","Platform":[{"code":"PF016","label":"Linux"}],"Version":"1.2;2.0;3.0;3.1;3.2;3.2.1;4.0;4.0.1;4.1;4.1.1","Edition":"All Editions","Line of Business":{"code":"LOB10","label":"Data and AI"}},{"Product":{"code":"SSCRJU","label":"IBM Streams"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":" ","Platform":[{"code":"PF016","label":"Linux"}],"Version":"1.2;2.0;3.0;3.1;3.2;3.2.1;4.0;4.0.1;4.1;4.1.1","Edition":"All Editions","Line of Business":{"code":"LOB10","label":"Data and AI"}}]

Document Information

Modified date:
16 June 2018

UID

swg21991065