An Apache Commons Collections vulnerability for handling Java object deserialization was addressed by IBM Tivoli Storage Manager for Virtual Environments: Data Protection for VMware (IBM Spectrum Protect for Virtual Environments) and the IBM Tivoli Storage FlashCopy Manager for VMware (IBM Spectrum Protect Snapshot).
DESCRIPTION: Apache Commons Collections could allow a remote attacker to execute arbitrary code on the system, caused by the deserialization of data with Java InvokerTransformer class. By sending specially crafted data, an attacker could exploit this vulnerability to execute arbitrary Java code on the system.
CVSS Base Score: 9.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/107918 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Affected Products and Versions
The following products and versions are affected:
- Tivoli Storage Manager for Virtual Environments: Data Protection for VMware
- 184.108.40.206 through 7.1.3.x
- 220.127.116.11 through 6.4.3
- 18.104.22.168 through 22.214.171.124
- Tivoli Storage FlashCopy Manager for VMware
- 126.96.36.199 through 4.1.3.x
- 188.8.131.52 through 184.108.40.206
- 220.127.116.11 through 18.104.22.168
Tivoli Storage Manager for VE: Data Protection for VMware Release
|First Fixing VRMF Level|
|Link to Fix / Fix Availability Target|
|Tivoli Storage |
FlashCopy Manager for VMware Release
First Fixing VRMF Level
Link to Fix / Fix Availability Target
|3.2||22.214.171.124||Linux||Note that 126.96.36.199 is no longer available for download. You can download 188.8.131.52 to obtain the fix:ftp://public.dhe.ibm.com/storage/tivoli-storage-flashcopymanager/patches/v3r2/vmware/|
|3.1||184.108.40.206||Linux||Fixes for release 3.1 are no longer available for download as this release is no longer supported. Customers requiring fixes should upgrade to the latest release which contains the most recent security fixes. Contact IBM Support with any questions.|
IBM recommends that you review your entire environment to identify vulnerable releases of the open-source Apache Commons Collections and take appropriate mitigation and remediation actions.
Workarounds and Mitigations
Get Notified about Future Security Bulletins
03 December 2015 - Initially published
14 December 2015 - Added link to fix for FCM for VMware 4.1.4
13 April 2018 - Remove links to 3.1 as release is no longer supported.
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
17 June 2018