Security Bulletin
Summary
A vulnerability has been addressed in the GSKit component of IBM Tivoli Storage Manager (IBM Spectrum Protect) Client/API and Server.
Bulletin update: 7.1.5 server and 7.1.4.4 AIX, Linux x86, Windows client fixes are available.
Vulnerability Details
CVEID: CVE-2016-0201
DESCRIPTION: IBM GSKit could allow a remote attacker to obtain sensitive information, caused by a MD5 collision. An attacker could exploit this vulnerability to obtain authentication credentials.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/109310 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
Affected Products and Versions
The following levels of IBM Tivoli Storage Manager (IBM Spectrum Protect) Client/API are affected:
- 7.1.0.0 through 7.1.4.2: AIX, Linux x86, Linux POWER LE Ubuntu, Windows
- 7.1.0.0 through 7.1.4.x: Linux POWER BE and LE, Linux zSeries, Linux x86 Ubuntu, Mac, HP-UX, Solaris
- 6.4.0.0 through 6.4.3.2, all platforms
- 6.3.0.0 through 6.3.2.5, all platforms
- 6.2 all levels, all platforms
The following levels of IBM Tivoli Storage Manager (IBM Spectrum Protect) Server are affected:
- 7.1.0.0 through 7.1.4.x, all platforms
- 6.3.0.0 through 6.3.5.x, all platforms
Remediation/Fixes
Tivoli Storage Manager Client Release | Fixing VRM Level | Platform | Link to Fix / Fix Availability Target |
7.1 | 7.1.4.4* | AIX Linux x86 Linux POWER LE (Ubuntu) Windows | http://www.ibm.com/support/docview.wss?uid=swg24041518 |
7.1 | 7.1.6 | AIX HP-UX Linux Macintosh Solaris Windows | http://www.ibm.com/support/docview.wss?uid=swg24042350 |
6.4 | 6.4.3.3 | AIX HP-UX Linux Macintosh Solaris Windows | http://www.ibm.com/support/docview.wss?uid=swg24041144 |
6.3 | 6.3.2.6 | AIX HP-UX Linux Macintosh Solaris Windows | http://www.ibm.com/support/docview.wss?uid=swg24037930 |
*Note: 7.1.4.4 had a limited platform distribution.
Tivoli Storage Manager Server Release | Fixing VRM Level | Platform | Link to Fix / Fix Availability Target |
7.1 | 7.1.5 | AIX HP-UX Linux Solaris Windows | http://www.ibm.com/support/docview.wss?uid=swg24041864 |
` 6.3 | 6.3.6 | AIX HP-UX Linux Solaris Windows | http://www.ibm.com/support/docview.wss?uid=swg24042544 |
For other platforms and releases, refer to the Workarounds and Mitigations.
Workarounds and Mitigations
Tivoli Storage Manager (TSM) as delivered uses TLS 1.1 and lower protocols for SSL sessions. The GSKit component of TSM is only vulnerable to this security issue if SSL sessions use TLS 1.2 (or higher) protocol.
No action is required if the following conditions are both true:
- The SSLTLS12 and SSLDISABLELEGACYTLS parameters are not present (this is the default) or are both parameters are set to NO in the TSM server options file. The TSM server options file is located in the dsmserv.opt file in the server instance directory.
- The SSLDISABLELEGACYTLS parameter is not present (this is the default) or is set to NO in the TSM client options file. The TSM client options file is located in file dsm.sys (AIX, HP_UX, Linux, Mac OSX, and Solaris) or file dsm.opt (Windows) in the client instance directory.
If the values for the above parameters are set to YES, then they should be changed to NO to eliminate exposure to this security issue.
In the TSM server options file (dsmserv.opt), specify the following parameters:
SSLTLS12 no
SSLDISABLELEGACYTLS no
In the TSM client options files, specify the following parameters in file dsm.sys file (AIX, HP_UX, Linux, Mac OS X, and Solaris) or file dsm.opt file (Windows):
SSLDISABLELEGACYTLS no
If these parameters are changed, the TSM server must be recycled.
Get Notified about Future Security Bulletins
References
Acknowledgement
None
Change History
11 February 2016 - Original version published
22 February 2016- Added API is affected - TSM client/API
18 March 2016 - Added TSM server 7.1.5 fixes and TSM client 7.1.4.4 fixes
30 June 2016 - Added 7.1.6 fixes. and 6.4.3.3 fixes.
25 July 2016 - Added TSM server 6.3.6 fix
31 August 2016 - Added TSM client 6.3.2.6 fix
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
Document Information
Modified date:
17 June 2018
UID
swg21975839