ESB-2019.1230 - [Win][Linux][AIX] IBM Tivoli Storage Productivity Center: Denial of service - Existing account 2019-04-10

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.1230
IBM Security Bulletin: Potential denial of service in WebSphere Application
        Server Admin Console affects IBM Spectrum Control (formerly
            Tivoli Storage Productivity Center) (CVE-2019-4080)
                               10 April 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Tivoli Storage Productivity Center
Publisher:         IBM
Operating System:  AIX
                   Linux variants
                   Windows
Impact/Access:     Denial of Service -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-4080  

Reference:         ESB-2019.1180
                   ESB-2019.1161
                   ESB-2019.1083.2

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=ibm10879577

- --------------------------BEGIN INCLUDED TEXT--------------------

Potential denial of service in WebSphere Application Server Admin Console
affects IBM Spectrum Control (formerly Tivoli Storage Productivity Center)
(CVE-2019-4080)

Product:             Tivoli Storage Productivity Center

Software version:    5.2.0, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.4.1, 5.2.6, 5.2.7.1

Operating system(s): AIX, Linux, Windows

Reference #:         0879577

Security Bulletin

Summary

There is a potential denial of service in WebSphere Application Server Admin
Console which affects IBM Spectrum Control (formerly Tivoli Storage
Productivity Center).

Vulnerability Details

CVEID: CVE-2019-4080
DESCRIPTION: IBM WebSphere Application Server Admin Console is vulnerable to a
potential denial of service, caused by improper parameter parsing. A remote
attacker could exploit this to consume all available CPU resources.
CVSS Base Score: 6.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
157380 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

+--------------------------------------+-----------------+
|Affected Product                      |Affected Versions|
+--------------------------------------+-----------------+
|IBM Tivoli Storage Productivity Center|5.2.0 - 5.2.7.1  |
+--------------------------------------+-----------------+
|IBM Spectrum Control                  |5.2.8 - 5.2.13   |
+--------------------------------------+-----------------+

The versions listed above apply to all licensed offerings of IBM Spectrum
Control.

Note that 5.3 versions of IBM Spectrum Control are not affected.

Remediation/Fixes

The solution is to apply an appropriate IBM Spectrum Control fix. Click on the
download link and follow the Installation Instructions. The solution should be
implemented as soon as practicable.

Starting with 5.2.8, Tivoli Storage Productivity Center has been renamed to IBM
Spectrum Control.

+----------+--------------------------------+-----------------------------------------------------------------------------+
|Release   |First Fixing VRM Level          |Link to Fix/Fix Availability Target                                          |
+----------+--------------------------------+-----------------------------------------------------------------------------+
|5.2.x     |5.2.14                          |http://www.ibm.com/support/docview.wssuid=swg21320822                       |
+----------+--------------------------------+-----------------------------------------------------------------------------+
Note: It is always recommended to have a current backup before applying any
update procedure.

Workarounds and Mitigations

None.

Reference

Complete CVSS v3 Guide
On-line Calculator v3

Related Information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

4 April 2019 - original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

                          Cross reference information
        Product         Component   Platform           Version          Edition
 IBM Spectrum Control             AIX, Linux,  5.2.8, 5.2.10.1, 5.2.11,
   Standard Edition               Windows      5.2.12, 5.2.13

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=+LnL
-----END PGP SIGNATURE-----

« Back to bulletins