IBM Support

Security Bulletin: Vulnerability in InstallShield affects IBM Tivoli Storage Manager for Databases: Data Protection for Microsoft SQL Server (CVE-2016-2542)

Security Bulletin


Summary

InstallShield generates installation executables which are vulnerable to a DLL-planting that affects IBM Tivoli Storage Manager for Databases: Data Protection for Microsoft SQL Server (IBM Spectrum Protect for Databases) on Windows platforms.

Vulnerability Details

CVEID: CVE-2016-2542
DESCRIPTION: Flexera InstallShield could allow a local attacker to gain elevated privileges on the system, caused by an untrusted search path. An attacker could exploit this vulnerability using a Trojan horse DLL in the current working directory of a setup-launcher executable file to gain elevated privileges on the system.
CVSS Base Score: 7.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/110914 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

The following levels of IBM Tivoli Storage Manager for Databases: Data Protection for Microsoft SQL Server (IBM Spectrum Protect for Databases) are affected:

  • 7.1.0.0 through 7.1.4.1
  • 6.4.0.0 through 6.4.1.8
  • 6.3.0.0 through 6.3.1.6
  • 5.5 all levels (this release is End Of Service and End of Life Cycle is 4/30/2017)

Remediation/Fixes

This security exposure occurs only at installation time and does not affect an already installed Tivoli Storage Manager for Databases: Data Protection for Microsoft SQL Server.

If you are not installing a fixed level of Tivoli Storage Manager for Databases: Data Protection for Microsoft SQL Server (7.1.4.2, 6.4.1.9, or 6.3.1.7), then the installation package is vulnerable to this security issue during installation and you must use the workaround provided below to prevent being exposed to the vulnerability.


Data Protection for Microsoft SQL Server VersionFirst
Fixing
VRM Level
Link to Fix / Fix Availability Target
7.17.1.4.2ftp://public.dhe.ibm.com/storage/tivoli-storage-management/patches/tivoli-data-protection/sql/v714/windows/
6.46.4.1.9ftp://public.dhe.ibm.com/storage/tivoli-storage-management/patches/tivoli-data-protection/sql/v641/windows/
6.36.3.1.7ftp://public.dhe.ibm.com/storage/tivoli-storage-management/patches/tivoli-data-protection/sql/v631/windows/
5.5NoneUpgrade to a fixed level (7.1.4.2, 6.4.1.9, or 6.3.1.7) or use the workaround provided below.

Workarounds and Mitigations

This security exposure occurs only at installation time and does not affect an already installed Tivoli Storage Manager for Databases: Data Protection for Microsoft SQL Server.

To prevent exposure to this security vulnerability, download and run the installation package from a clean directory using the following steps:

  1. As an administrator, create a new secure directory. The directory must not exist before and only the administrator should have write permission to it.
  2. Unzip or copy the files from your installation media into this new directory.
  3. Run the installation exe from this directory to install the product. Proceed with the installation as normal.

If installation of a Tivoli Storage Manager for Databases: Data Protection for Microsoft SQL Server package below the fixing level (7.1.4.2, 6.4.1.9, or 6.3.1.7) or installation of a package for release 5.5 is required, then the above workaround should be used to avoid exposure to this vulnerability during the installation process. The workaround is not needed if the fixing level (7.1.4.2, 6.4.1.9, or 6.3.1.7) or a higher level of the package is installed.

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

None

Change History

05 May 2016 - Original version published
11 May 2016 - Updated CVE Information; CVSS Score and Vector
23 May 2016 - Updated target availability date of 6.3.1.7 fix to June 13, 2016
25 May 2016 - Added link for 6.3.1.7 fix
27 May 2016 - Updated CVE Description and clarified workaround
15 August 2016 - Updated Remediation/Fixes and Workarounds and Mitigations to clarify when exposure occurs

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{"Product":{"code":"SSTFZR","label":"Tivoli Storage Manager for Databases"},"Business Unit":{"code":"BU010","label":"Systems - Storage"},"Component":"Data Protection for MS SQL","Platform":[{"code":"PF033","label":"Windows"}],"Version":"5.5;6.3;6.4;7.1","Edition":"All Editions"}]

Document Information

Modified date:
17 June 2018

UID

swg21982467