IBM General Parallel File System Multiple Vulnerabilities (Windows) (POODLE)

Medium Nessus Plugin ID 80885


A clustered file system on the remote host is affected by multiple vulnerabilities.


A version of IBM General Parallel File System (GPFS) 3.5.x prior to is installed on the remote Windows host. It is, therefore, affected by the following OpenSSL related vulnerabilities :

- An error exists related to DTLS SRTP extension handling and specially crafted handshake messages that can allow denial of service attacks via memory leaks.

- An error exists related to the way SSL 3.0 handles padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode.
Man-in-the-middle attackers can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections. This is also known as the 'POODLE' issue. (CVE-2014-3566)

- An error exists related to session ticket handling that can allow denial of service attacks via memory leaks.

- An error exists related to the build configuration process and the 'no-ssl3' build option that allows servers and clients to process insecure SSL 3.0 handshake messages. (CVE-2014-3568)


Upgrade to GPFS or later.

If GPFS multiclustering is configured on Windows nodes, consult the vendor advisory for detailed instructions.

See Also

Plugin Details

Severity: Medium

ID: 80885

File Name: ibm_gpfs_isg3T1021546_windows.nasl

Version: 1.11

Type: local

Agent: windows

Family: Windows

Published: 2015/01/21

Updated: 2019/11/25

Dependencies: 72504

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2014-3568

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:ibm:general_parallel_file_system

Required KB Items: installed_sw/IBM General Parallel File System

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/11/11

Vulnerability Publication Date: 2014/10/14

Reference Information

CVE: CVE-2014-3513, CVE-2014-3566, CVE-2014-3567, CVE-2014-3568

BID: 70574, 70584, 70585, 70586

CERT: 577193