• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • IBM Patches Pair of Security Flaws in iAccess for Windows 7.1

    December 2, 2015 Alex Woodie

    IBM last month revealed the presence of a pair of security vulnerabilities in iAccess for Windows 7.1, including one that could allow a local cybercriminal to take control of the Windows PC running the iAccess software, and another that could be used to launch a denial of service attack. Big Blue patched both flaws with a PTF.

    IBM provided some details of the security flaws with a Security Bulletin N1020996 published November 18, which is the same day it released PTF number SI57907 to fix the flaws in iAccess for Windows 7.1.

    The buffer overflow flaw that was given the name CVE-2015-2023 is the more severe of the two flaws. According to John Page of hyp3rlinx, the firm that’s been given credit for first finding the vulnerabilities. The CVE-2015-2023 flaw carries a “high” severity level.

    This specific buffer overflow flaw exists in iAccess’s “Cwbrxd.exe” service, according to Page’s hyp3rlinx’s webpage. That service utilizes the Incoming Remote Command (IRC) function for submitting remote commands from an IBM i server to execute on a PC, he says. “A local attacker could overflow a buffer and execute arbitrary code on the Windows PC,” Page writes.

    It’s important to note that, while the Windows PC running iAccess (not the IBM i server itself) is the target of this buffer overflow flaw, that doesn’t necessarily mean there is no threat to the IBM i server. The hodge-podge of various equipment and computers surrounding an IBM i server–rather than flaws in IBM i system software itself–usually pose the biggest security vulnerabilities for any given installation, IBM i security pros tell IT Jungle.

    The second vulnerability, which is referred to as CVE-2015-7422, is another buffer overflow that could lead an attacker to execute a denial of service (DOS) attack. This flaw, which was caused by improper bounds checking, could enable a local attacker to overflow a buffer and cause the program to crash. It was assigned a “medium” severity level by Page.

    Curiously, the Common Vulnerabilities and Exposure (CVE) database has no details for either CVE-2015-2023 or CVE-2015-7422. In both cases, the website says “this candidate has been reserved by an organization or individual that will use it when announcing a new security problem.”

    IBM was notified about the flaws in iAccess for Windows 7.1 on May 21, according to the details of the flaws on Page’s hyp3rlinx webpage. That means IBM i shops were exposed to the vulnerability for 181 days after IBM first knew about the problem. That’s significantly longer than the average number of days it takes a vendor to respond, according to a recent study by NopeSec that found the average was 103 days.

    It’s worth noting that IBM is in the process of depreciating the iAccess product line, which traces its roots back to the Client Access days and Operations Navigator. On its iAccess webpage, IBM notes that it has no plans to support iAccess for Windows on operating systems beyond Windows 8.1.

    IBM encourages users to replace iAccess for Windows with the IBM i Access Client Solutions. The ACS product was developed in Java, runs anywhere a JVM can be installed (including Android devices), and includes 5250 emulation, data transfer, printer output, and console support.

    RELATED STORIES

    IBM Tops List of Security Vulnerabilities, But What Does It Mean?

    IBM Patches More OpenSSL Flaws In IBM i

    Keeping Up With Security Threats To IBM i

    State of IBM i Security? Still Horrible, After All These Years

    An IBM i Client for Every Administrative Occasion

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    DRV Tech

    Get More Out of Your IBM i

    With soaring costs, operational data is more critical than ever. IBM shops need faster, easier ways to distribute IBM applications-based data to users more efficiently, no matter where they are.

    The Problem:

    For Users, IBM Data Can Be Difficult to Get To

    IBM Applications generate reports as spooled files, originally designed to be printed. Often those reports are packed together with so much data it makes them difficult to read. Add to that hardcopy is a pain to distribute. User-friendly formats like Excel and PDF are better, offering sorting, searching, and easy portability but getting IBM reports into these formats can be tricky without the right tools.

    The Solution:

    IBM i Reports can easily be converted to easy to read and share formats like Excel and PDF and Delivered by Email

    Converting IBM i, iSeries, and AS400 reports into Excel and PDF is now a lot easier with SpoolFlex software by DRV Tech.  If you or your users are still doing this manually, think how much time is wasted dragging and reformatting to make a report readable. How much time would be saved if they were automatically formatted correctly and delivered to one or multiple recipients.

    SpoolFlex converts spooled files to Excel and PDF, automatically emailing them, and saving copies to network shared folders. SpoolFlex converts complex reports to Excel, removing unwanted headers, splitting large reports out for individual recipients, and delivering to users whether they are at the office or working from home.

    Watch our 2-minute video and see DRV’s powerful SpoolFlex software can solve your file conversion challenges.

    Watch Video

    DRV Tech

    www.drvtech.com

    866.378.3366

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Connectria:  Need help managing your IBM i? Trust us as an extension of your IT department.
    United Computer Group:  VAULT400 BaaS delivers secure cloud backup and DR solutions
    Cilasoft:  Stay on top of your most difficult IBM i security challenges with our Auditing and Security Suite.

    Detecting A “Job End” Condition in DB2 for i A Rising Tide

    Leave a Reply Cancel reply

Volume 25, Number 60 -- December 2, 2015
THIS ISSUE SPONSORED BY:

ProData Computer Services
HelpSystems
United Computer Group, Inc.
Midrange Dynamics
Manta Technologies

Table of Contents

  • IBM Patches Pair of Security Flaws in iAccess for Windows 7.1
  • Urgent Need for Application Modernization Seen at the Federal Level
  • Remain Taps JIRA to Heighten Change Management Collaboration
  • Quadrant Doubles Down on Simplicity with Formtastic 10
  • HATS Now Hooked Into BlueMix Cloud

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle