IBM Support

Security Bulletin: IBM Tivoli Storage Manager Client vulnerable to Client Acceptor Daemon (CAD) crash (CVE-2015-4951)

Security Bulletin


Summary

The IBM Tivoli Storage Manger (IBM Spectrum Protect) client is vulnerable to a remote attacker crashing the Client Acceptor Daemon (CAD) by sending a specially crafted URL to access the Tivoli Storage Manager Web client.

Vulnerability Details

CVEID: CVE-2015-4951
DESCRIPTION:
IBM Tivoli Storage Manager could allow a remote attacker to crash the Client Acceptor Daemon (CAD) by sending a specially crafted URL is used to access TSM Web client. The vulnerability is exploitable only when the CAD service is running and is managing the web client (i.e., MANAGEDSERVICES option either contains WEBCLIENT or is not explicitly set).
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/105042 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

Affected Products and Versions

The Tivoli Storage Manager client is affected by the following levels:

  • 7.1.0.0 through 7.1.2.x
  • 6.4.0.0 through 6.4.3.0
  • 6.3.0.0 through 6.3.2.4
  • 6.2 all levels
  • 6.1 all levels
  • 5.5 all levels

Remediation/Fixes

Tivoli Storage Manager Client Release

Fixing VRM Level

Platform
Link to Fix / Fix Availability Target
7.17.1.3AIX
HP-UX
Linux
Mac
Solaris
Windows
http://www.ibm.com/support/docview.wss?uid=swg24040368
6.46.4.3.1AIX
HP-UX
Linux
Mac
Solaris
Windows
http://www.ibm.com/support/docview.wss?uid=swg24041144
6.36.3.2.5AIX
HP-UX
Linux
Mac
Solaris
Windows
http://www.ibm.com/support/docview.wss?uid=swg24037930
6.2, 6.1, and 5.5

IBM recommends 6.2, 6.1, and 5.5 users upgrade to a fixed level (7.1.3, 6.4.3.1, or 6.3.2.5 - see links provided above).

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

Carlo Beccaria at Equens

Change History

20 January 2016 - Original version published
01 February 2016 - Added clarification to the CVE Description to indicate the vulnerability is exploitable only when the CAD service is running and is managing the web client (i.e., MANAGEDSERVICES option either contains WEBCLIENT or is not explicitly set).

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{"Product":{"code":"SSGSG7","label":"Tivoli Storage Manager"},"Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Component":"Client","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF010","label":"HP-UX"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"},{"code":"PF033","label":"Windows"}],"Version":"6.1;6.2;6.3;6.4;7.1","Edition":"All Editions","Line of Business":{"code":"LOB26","label":"Storage"}}]

Document Information

Modified date:
17 June 2018

UID

swg21973484