Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.2379 Password disclosure in IBM Spectrum Protect Server (CVE-2019-4140) 1 July 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM Spectrum Protect Publisher: IBM Operating System: Windows AIX HP-UX Linux variants Solaris Impact/Access: Overwrite Arbitrary Files -- Existing Account Access Confidential Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2019-4140 Original Bulletin: http://www.ibm.com/support/docview.wss?uid=ibm10883346 - --------------------------BEGIN INCLUDED TEXT-------------------- Password disclosure in IBM Spectrum Protect Server (CVE-2019-4140) Product: IBM Spectrum Protect Component: Server Software version: 7.1, 8.1 Operating system(s): AIX, HP-UX, Linux, Solaris, Windows Reference #: 0883346 Security Bulletin Summary The IBM Spectrum Protect (formerly Tivoli Storage Manager) Server may disclose the database restore password when using the dsmserv restore db command. This could allow another user to perform a database restore or possibly result in an old backup replacing the database. Vulnerability Details CVEID: CVE-2019-4140 DESCRIPTION: IBM Tivoli Storage Manager Server could allow a local user to replace existing databases by restoring old data. CVSS Base Score: 6.3 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 158336 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N) Affected Products and Versions This vulnerability affects the following IBM Spectrum Protect (formerly Tivoli Storage Manager) Server levels: o 8.1.0.0 through 8.1.7.xxx o 7.1.0.0 through 7.1.9.200 Remediation/Fixes This vulnerability is resolved by applying the First Fixing VRM Level (or higher) as noted in the following table and by not specifying the PASSWORD parameter when using the dsmserv restore db command. When the PASSWORD parameter is not specified, the IBM Spectrum Protect Server will prompt for the password used to protect the database backup. +------------------------+------------+------------+--------------------------------------------------------------------------------------+ |IBM Spectrum Protect |First Fixing|Platform |Link to Fix | |Server Release |VRM Level | | | +------------------------+------------+------------+--------------------------------------------------------------------------------------+ |8.1 |8.1.8 |AIX |https://www.ibm.com/support/docview.wssuid=ibm10888463 | | | |Linux | | | | |Windows | | +------------------------+------------+------------+--------------------------------------------------------------------------------------+ | | |AIX |ftp://public.dhe.ibm.com/storage/tivoli-storage-management/patches/server/ | | | |HP-UX | | |7.1 |7.1.9.300 |Linux | | | | |Solaris | | | | |Windows | | +------------------------+------------+------------+--------------------------------------------------------------------------------------+ Workarounds and Mitigations None Change History 28 June 2019 - original version published - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXRmUxmaOgq3Tt24GAQiZvRAAr2L9iz9Dl/x0RKg29Tcz6HGp+a+gz0kH XCblvaMjNvFvI2/KnE7QOubSBWlTIFU0LSMFebHZkQtDG8t2LnXN/ygH/O7gcKIB CoGVmK0Y/tAGEm3IbXNhNQb2hg0gCgAnAbS6bgX2LQBIAllNsv1zSefqeiO8Tmpg +jat/hOs1+G7M52lAFhzcudMtebUni7l554hfxZV449uhmU89yp+SFqgG02LX6m3 W3lf2/KzPiomRezqhw/kwWOdFi9pdPgm0koCj5fV0+uzthHJJsmj/AGFgU4qfLyl /qBVMaBc2fCiGvLVJQqa1ZcLKg9logddvOfT1hkPGPcZi4z7SEOq1smXk7gXX+7H 80hkxupKaXXFIUX1ZYst1k7KWG3LMrnEt49sfm/t5JzQq0BFheYNDNfKbEoJYosX Bzw3LkOkonx2KMmeRMQc6rJo9hfthkVBn5+zfLx2B6jSr2B096QV8pXdBenezAfL yMPbwt31w0ntXFKmqE7jeDQaP2SqLvGz/8gE6BaWJQphakosWadNkzRZ80XryVv2 lOmGbOBGlh0206SyVkMf/g+1OtGPHN1ygmjW7ggJsJquQPQ4LvAny2+lsX7HPGbR BBg1e+c05e9WXsoLUm3KByx/9VtjmjJPodu0IsVGtuSr/XiK42CMgT93UV2Uj7sf 5l0Qbq2G22o= =5+Ga -----END PGP SIGNATURE-----