• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Another i5/OS-i Security Vulnerability Surfaces

    June 16, 2008 Timothy Prickett Morgan

    You have to work pretty hard to find a security vulnerability in the OS/400, i5/OS, and i operating systems, and according to a posting from computer security research and development company Secunia last week, to find the latest one, you have to look in a very unlikely place: the system modem.

    According to a Secunia advisory published last week, a security vulnerability in an operating system module with the name BrSmRcvAndCheck, which can apparently be exploited to cause a buffer overflow when running diagnostics on the modem port. Secunia rated this as a “less critical” patch when it issued its report on June 11 regarding the vulnerability, and said further that it would have an “unknown impact.” Which presumably means precisely what it says: That IBM has not been clear about the impact.

    The important thing, according to an IBM update on the matter is that the flaw has been patched. And in that report on the matter, IBM said that a task halt during IPL exploiting this vulnerability could cause a buffer overflow during the modem diagnostics, which in turn causes and error that then forces a main memory dump. IBM says that it has tweaked the microcode in the affected i5/OS and i platforms that are affected by this vulnerability, which includes i5/OS V5R4 and V5R4M5 and the new i 6.1. Get your PTFs handy.

    RELATED STORIES

    IBM Patches Security Flaw in Quickr for i5/OS

    Security Vulnerability Reported in i5/OS

    IBM Patches Security Flaw in OS/400 V5R3



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 17, Number 24 -- June 16, 2008

    Sponsored by
    Raz-Lee Security

    Start your Road to Zero Trust!

    Firewall Network security, controlling Exit Points, Open DB’s and SSH. Rule Wizards and graphical BI.

    Request Demo

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: All About the System i Attention Light Sysload Delivers Fine-Grain Monitoring for Virtual Servers

    Leave a Reply Cancel reply

TFH Volume: 17 Issue: 24

This Issue Sponsored By

    Table of Contents

    • Happy 20th Birthday, AS/400!
    • The Power 595 Takes the Top TPC-C Benchmark Ranking
    • The World Can’t Get Enough Disk Array Capacity
    • Mad Dog 21/21: iPhone Home
    • IBM Is Enjoying the Role of Green Giant
    • Reader Feedback on Forget About Platforms, Let’s Talk About Jobs
    • Another i5/OS-i Security Vulnerability Surfaces
    • There’s Still Money in Operating Systems, But Disruptions Loom
    • SPEC Members Start on Energy Benchmark for Web Servers
    • Enterprises Are Judged by the Measure of IT Performance

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Liam Allan Shares What’s Coming Next With Code For IBM i
    • From Stable To Scalable: Visual LANSA 16 Powers IBM i Growth – Launching July 8
    • VS Code Will Be The Heart Of The Modern IBM i Platform
    • The AS/400: A 37-Year-Old Dog That Loves To Learn New Tricks
    • IBM i PTF Guide, Volume 27, Number 25
    • Meet The Next Gen Of IBMers Helping To Build IBM i
    • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
    • Will Independent IBM i Clouds Survive PowerVS?
    • Now, IBM Is Jacking Up Hardware Maintenance Prices
    • IBM i PTF Guide, Volume 27, Number 24

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle