Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2020-25705 CVE-2020-28374 |
CWE-ID | CWE-330 CWE-22 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software Subscribe |
IBM Security Guardium Client/Desktop applications / Antivirus software/Personal firewalls |
Vendor | IBM Corporation |
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU49150
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2020-25705
CWE-ID:
CWE-330 - Use of Insufficiently Random Values
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
A flaw in the way reply ICMP packets are limited in the Linux kernel functionality was found that allows to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.
MitigationInstall update from vendor's website.
Vulnerable software versionsIBM Security Guardium: 11.0 - 11.3
http://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-affected-by-a-kernel-vulnerability-cve-2020-25705-cve-2020-28374-4/
http://www.ibm.com/support/pages/node/6459941
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU49914
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2020-28374
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in drivers/target/target_core_xcopy.c in the Linux kernel. A remote user with access to iSCSI LUN can send a specially crafted XCOPY request and read or write arbitrary files on the system.
Install update from vendor's website.
Vulnerable software versionsIBM Security Guardium: 11.0 - 11.3
http://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-affected-by-a-kernel-vulnerability-cve-2020-25705-cve-2020-28374-4/
http://www.ibm.com/support/pages/node/6459941
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?