What are you looking for ?
Advertise with us
RAIDON

IBM Support Security Bulletin Concerning Spectrum Protect Server and Storage Agents

Stack-based buffer overflow and elevation of privileges vulnerabilities

The IBM Corp.‘s Spectrum Protect (formerly Tivoli Storage Manager) server and storage agents are vulnerable to a stack-based buffer overflow and elevation of privileges.

Vulnerability details
CVEID:
CVE-2019-4087

  • Description: IBM Spectrum Protect Servers and Storage Agents are vulnerable to a stack-based buffer overflow, caused by improper bounds checking by servers and storage agents in response to specifically crafted communication exchanges. By sending an overly long request, a remote attacker could overflow a buffer and execute arbitrary code on the system with instance id privileges or cause the server or storage agent to crash.
    CVSS Base Score: 9.8
    CVSS Temporal Score: See for the current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID: CVE-2019-4088

  • Description: IBM Spectrum Protect Servers and Storage Agents could allow a local attacker to gain elevated privileges on the system, caused by loading a specially crafted library loaded by the dsmqsan module. By setting up such a library, a local attacker could exploit this vulnerability to gain root privileges on the vulnerable system.
    CVSS Base Score: 7.4
    CVSS Temporal Score: See for the current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected products and versions:
This vulnerability affects the following Spectrum Protect server levels:

  • 8.1.0.0 through 8.1.7.xxx

  • 7.1.0.0 through 7.1.9.200

Remediation/fixes

IBM Spectrum Protect
Server Release

First Fixing
VRM Level

Platform

Link to Fix

            8.1

8.1.8

AIX
Linux
Windows

https://www.ibm.com/support/docview.wss?uid=ibm10888463

            7.1

7.1.9.300

AIX
HP-UX
Linux
Solaris
Windows

ftp://public.dhe.ibm.com/storage/tivoli-storage-management/patches/server/

Workarounds and mitigations
None.

Get notified about future security bulletins
Subscribe to My Notifications to be notified of important product support alerts like this.

Reference
Complete CVSS v3 Guide
On-line Calculator v3

Related Information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowledgement
These vulnerabilities were reported to IBM by Sébastien Charbonnier and Undr

Change History
28 June 2019 – original version published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an ‘industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.’ IBM PROVIDES THE CVSS SCORES ‘AS IS’ WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Cross reference information

Product

Component

Platform

Version

Edition

Tivoli Storage Manager

Server

AIX, HP-UX, Linux, Solaris, Windows

7.1

 
Articles_bottom
ExaGrid
AIC
ATTOtarget="_blank"
OPEN-E