This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.
A clustered file system on the remote host is affected by a memory
corruption vulnerability related to OpenSSH.
A version of IBM General Parallel File System (GPFS) that is 126.96.36.199
or later but prior to 188.8.131.52 is installed on the remote host. It is,
therefore, affected by a memory corruption issue in the bundled
version of OpenSSH. The issue exists due to a failure to initialize
certain data structures when makefile.inc is modified to enable the
J-PAKE protocol. An unauthenticated, remote attacker can exploit this
to corrupt memory, resulting in a denial of service condition and
potentially the execution of arbitrary code.
See also :
Upgrade to IBM GPFS version 184.108.40.206 or later.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : false