Security Vulnerabilities Addressed in Asset and Service Mgmt

Flash (Alert)


Abstract

Security Bulletin: XSS, Gain Privileges, Improper Access Control vulnerabilities in Maximo Asset Mgmt, Tivoli Asset Mgmt for IT, Tivoli Service Request Mgr, Change and Configuration Mgmt Database, and SmartCloud Control Desk. See Details for CVE IDs.

Content

VULNERABILITY DETAILS:
Customers who have Maximo Asset Management, Maximo Asset Management Essentials, Tivoli Asset Management for IT, Tivoli Service Request Manager, Change and Configuration Management Database, and SmartCloud Control Desk are potentially impacted by these vulnerabilities, which can cause issues related to Cross-Site Scripting (XSS), which can be used to bypass access controls, gaining elevated privileges, and improper access control.

CVE ID APAR DESCRIPTION CVSS
Base
Score
CVSS Temporal Score Link CVSS Vector(see below)
CVE-2012-2159 JR43170 Open Redirect 4.3 http://xforce.iss.net/xforce/xfdb/74832 3
CVE-2012-2161 JR43170 Cross-site Scripting 4.3 http://xforce.iss.net/xforce/xfdb/74833 3
CVE-2012-3316 IV24609 Cross-Site Scripting 3.5 http://xforce.iss.net/xforce/xfdb/77813 1
CVE-2012-3321 IV25198 Improper Access Control 6.5 http://xforce.iss.net/xforce/xfdb/77916 2
CVE-2012-3322 IV23838 Cross-Site Scripting 3.5 http://xforce.iss.net/xforce/xfdb/77918 1
CVE-2012-3327 IV22698 Cross Site Scripting 4.3 http://xforce.iss.net/xforce/xfdb/78039 3
CVE-2012-3328 IV20823 Cross-Site Scripting 4.3 http://xforce.iss.net/xforce/xfdb/78040 3
CVE-2012-6355 IV30384 Gain Privileges 3.5 http://xforce.iss.net/xforce/xfdb/80747 1
CVE-2012-6356 IV27329 Gain Privileges 3.5 http://xforce.iss.net/xforce/xfdb/80748 1
CVE-2012-6357 IV23511 Gain Privileges 3.5 http://xforce.iss.net/xforce/xfdb/80749 1
CVE-2013-0457 IV20590 Cross-site Scripting 3.5 http://xforce.iss.net/xforce/xfdb/81011 1
Note: CVE-2012-2159 and CVE-2012-2161 are vulnerabilities in the IBM Eclipse Help System (IEHS) 3.4.2, a viewer provided to render user assistance documentation.

CVSS Vector:
1 AV:N/AC:M/Au:S/C:N/I:P/A:N
2 AV:N/AC:L/Au:S/C:P/I:P/A:P
3 AV:N/AC:M/Au:N/C:N/I:P/A:N

* CVSS Environmental Scores: Undefined

VERSIONS AFFECTED:
· Maximo Asset Management 7.5, 7.1, 6.2
· Maximo Asset Management Essentials 7.5, 7.1, 6.2
· SmartCloud Control Desk 7.5
· Tivoli Asset Management for IT 7.2, 7.1, 6.2
· Tivoli Service Request Manager 7.2, 7.1, Maximo Service Desk 6.2
· Change and Configuration Management Database 7.2, 7.1

Products Listed Above
CVE APAR 7.5 7.1 / 7.2 6.2
CVE-2012-2159 JR43170 Fixed Fix Pending N/A
CVE-2012-2161 JR43170 Fixed Fix Pending N/A
CVE-2012-3316 IV24609 Fixed Fix Pending Fix Pending
CVE-2012-3321 IV25198 Fixed** N/A N/A
CVE-2012-3322 IV23838 Fixed Fix Pending Fix Pending
CVE-2012-3327 IV22698 Fixed Fixed Fixed
CVE-2012-3328 IV20823 N/A Fix Pending N/A
CVE-2012-6355 IV30384 Fixed Fixed Fix Pending
CVE-2012-6356 IV27329 Fixed N/A N/A
CVE-2012-6357 IV23511 Fixed N/A N/A
CVE-2013-0457 IV20590 Fixed N/A N/A
N/A in this table means that the vulnerability does not exist in that release

Note:
** CVE-2012-3321 is only applicable to SmartCloud Control Desk 7.5, not Maximo Asset Management.

It is likely that earlier versions of affected products are also affected by these vulnerabilities. Remediation is not provided for product versions that are no longer supported. IBM recommends that customers upgrade to the latest supported version of products in order to obtain remediation for the vulnerabilities.

REMEDIATION:
The recommended solution is to download the appropriate Interim Fix or Fix Pack from Fix Central (What is Fix Central?) and apply for each affected product as soon as possible. Please see below for information on the fixes available for each product, version, and release. Follow the installation instructions in the ‘readme’ documentation provided with each fix pack or interim fix.

For Maximo Asset Management and Maximo Asset Management Essentials:

VRMF Fix Pack or Interim Fix Vulnerability APARs Download
7.5.0.4 Maximo 7.5.0.4 Fix Pack:
7.5.0.4-TIV-MAM-FP004
IV20590, IV22698, IV23511, IV23838, IV24609, IV27329, IV30384, and
IEHS 3.4.2 JR43170
FixCentral
7.5.0.2 Maximo 7.5.0.2 Interim Fix:
7.5.0.2-TIV-MAM-IFIX004 or latest Interim Fix available
IV27329 FixCentral
7.5.0.1 Maximo 7.5.0.1 Interim Fix:
7.5.0.1-TIV-MBS-IFIX004 or latest Interim Fix available
IV23511 FixCentral
7.1.1.12 7.1.1.12 Fix Pack:
7.1.1.12-TIV-MBS-FP012
IV20823, IV23838, IV24609, IV30384, and
IEHS 3.4.2 JR43170
FixCentral
when available
7.1.1.11 7.1.1.11 Fix Pack:
7.1.1.11-TIV-MBS-FP011
IV22698 FixCentral
6.2.8 6.2.8 Interim Fix:
Maximo_6.2.8_LAFix_20120725-1611 or latest Interim Fix available
IV22698, IV23838, IV24609, IV30384 Contact IBM Support

For SmartCloud Control Desk:
VRMF Fix Pack or Interim Fix Vulnerability APARs Download
7.5.0.2 SmartCloud Control Desk 7.5.0.2 Fix Pack:
7.5.0.2-TIV-SCCD-AIX-FP0002
7.5.0.2-TIV-SCCD-Linux-FP0002
7.5.0.2-TIV-SCCD-Windows-FP0002
IV20590, IV22698, IV23511, IV23838, IV24609, IV25198, IV27329, IV30384 and
IEHS 3.4.2 JR43170
FixCentral
7.5.1.0 SmartCloud Control Desk 7.5.1.0 Release IV20590, IV22698, IV23511, IV23838, IV24609, IV25198, IV27329, IV30384 and
IEHS 3.4.2 JR43170
Passport Advantage

For Tivoli IT Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, and Change and Configuration Management Database
VRMF Fix Pack or Interim Fix Vulnerability APARs Download
7.1.1.12 7.1.1.12 Fix Pack:
7.1.1.12-TIV-MBS-FP012
IV20823, IV23838, IV24609, IV30384, and
IEHS 3.4.2 JR43170
FixCentral
when available
7.1.1.11 7.1.1.11 Fix Pack:
7.1.1.11-TIV-MBS-FP011
IV22698 FixCentral
6.2.8 6.2.8 Interim Fix:
Maximo_6.2.8_LAFix_20120725-1611 or latest Interim Fix available
IV22698, IV23838, IV24609, IV30384 Contact IBM Support

If assistance is needed in determining the appropriate Fix Pack or Interim Fix level, contact IBM Technical Support. It is recommended that you always request the latest available Fix Pack or Interim Fix.

Due to the threat posed by a successful attack, IBM strongly recommends that customers apply fixes as soon as possible.

WORKAROUND:
Until you apply the fixes, it may be possible to reduce the risk of successful attack by restricting network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from unprivileged users may help reduce the risk of successful attack. Both approaches may break application functionality, so IBM strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.

MITIGATION: None

REFERENCES:
Complete CVSS Guide
On-line Calculator V2
X-Force Vulnerability Database
CVE-2012-2159
CVE-2012-2161
CVE-2012-3316
CVE-2012-3321
CVE-2012-3322
CVE-2012-3327
CVE-2012-3328
CVE-2012-6355
CVE-2012-6356
CVE-2012-6357
CVE-2013-0457

* The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.

Note:
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.


Change History
15 Feb 2013 Flash published

CROSS REFERENCE INFORMATION:
Segment Product Component/Platform Version
Systems and Asset Management Maximo Asset Management All 6.2.0 – 6.2.8
7.1.1.0 – 7.1.1.11
7.5.0.0 – 7.5.0.4
Systems and Asset Management Maximo Asset Management Essentials All 7.1.1.0 – 7.1.1.11
7.5.0.0 – 7.5.0.4
Systems and Asset Management Maximo Asset Management for Energy Optimization All 7.1.0.0 – 7.1.1.0
Systems and Asset Management Maximo for Government All 6.1.0.0
7.1.0.0
7.5.0.0
Systems and Asset Management Maximo for Nuclear Power All 6.3.0
7.1.0.0 – 7.1.1.0
7.5.0.0
Systems and Asset Management Maximo for Transportation All 6.3.0
7.1.0.0 – 7.1.1.0
7.5.0.0
Systems and Asset Management Maximo for Life Sciences All 6.4.0 – 6.5.0
7.1.0.0 – 7.1.2.0
7.5.00
Systems and Asset Management Maximo for Oil and Gas All 6.3.0 – 6.4.0
7.1.0.0 – 7.1.2.0
7.5.0.0
Systems and Asset Management Maximo for Utilities All 6.3.0
7.1.0.0 – 7.1.2.0
7.5.0.0
Systems and Asset Management Tivoli Service Request Manager

Maximo Service Desk
All 7.1.0.0 – 7.1.1.11
7.2.0.0 – 7.2.1.4
6.2.0 – 6.2.8
Systems and Asset Management Tivoli Asset Management for IT All 6.2.0 – 6.2.8
7.1.0.0 – 7.1.1.11
7.2.0.0 – 7.2.2.1
Systems and Asset Management Change and Configuration Management Database All 7.1.0.0 – 7.1.1.11
7.2.0.0 – 7.2.1.3
Systems and Asset Management SmartCloud Control Desk All 7.5.0.0 – 7.5.0.2
7.5.1.0


Cross reference information
Segment Product Component Platform Version Edition
Systems and Asset Management IBM Maximo Asset Management Essentials
Systems and Asset Management IBM Maximo Asset Management for Energy Optimization
Systems and Asset Management IBM Maximo for Government
Systems and Asset Management IBM Maximo for Nuclear Power
Systems and Asset Management IBM Maximo for Transportation
Systems and Asset Management IBM Maximo for Life Sciences
Systems and Asset Management IBM Maximo for Oil and Gas
Systems and Asset Management IBM Maximo for Utilities
Systems and Asset Management Tivoli Service Request Manager
Systems and Asset Management Tivoli Asset Management for IT
Systems and Asset Management Tivoli Change and Configuration Management Database
Systems and Asset Management IBM SmartCloud Control Desk

Rate this page:

(0 users)Average rating

Document information


More support for:

IBM Maximo Asset Management

Software version:

6.2, 6.2.1, 6.2.2, 6.2.3, 6.2.4, 6.2.5, 6.2.6, 6.2.7, 6.2.8, 7.1, 7.1.1, 7.1.2, 7.2, 7.2.1, 7.5

Operating system(s):

Platform Independent

Reference #:

1625624

Modified date:

2013-02-15

Translate my page

Machine Translation

Content navigation