IBM Support

Security Bulletin: Tivoli Storage Manager Linux x86_64 Client Arbitrary DSO Load Elevation of Privileges (CVE-2014-6185)

Security Bulletin


Summary

A vulnerability in the IBM Tivoli Storage Manager (TSM) Linux x86_64 client could allow a local user to gain elevated privileges due to an arbitrary DSO load.

Vulnerability Details

CVEID: CVE-2014-6185
DESCRIPTION:
IBM Tivoli Storage Manager could allow a local attacker to trick one of the client executables to load a shared library provided by the attacker and execute arbitrary code on the system as root. This affects Linux x86_64 platforms only.
CVSS Base Score: 7.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/98521 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:C )

Affected Products and Versions

  • TSM Client 7.1.0.0 through 7.1.12
  • TSM Client 6.4.0.0 through 6.4.2.1
  • TSM Client 6.3.0.0 through 6.3.2.2

Remediation/Fixes

TSM Release

First Fixing VRMF LevelClient
Platform
APARLink to fix
7.17.1.1.3Linux_x86_64IT05713Download packages for Tivoli Storage Manager 7.1.1 interim fix packages (7.1.1.x) and READMEs have been removed from the web as they contain unremediated security vulnerabilities. The latest version of 7.1 (7.1.6) contains fixes for the most recent known security and product issues, and can be found using this link:
http://www.ibm.com/support/docview.wss?uid=swg24042350
If you have any questions, please contact IBM support.
6.46.4.2.2Linux_x86_64IT05713Download packages for Tivoli Storage Manager 6.4.2 interim fix packages (6.4.2.x) and READMEs have been removed from the web as they contain unremediated security vulnerabilities. The latest version of 6.4 (6.4.3) can be found using this link:
http://www.ibm.com/support/docview.wss?uid=swg24040185
6.36.3.2.3Linux_x86_64IT05713http://www.ibm.com/support/docview.wss?uid=swg24037930
7.1 B/A clients in 7.1 TSM for Space Management package7.1.1.3Linux_x86_64IT05713Download packages for Tivoli Storage Manager for Space Management 7.1.1 interim fix packages (7.1.1.x) and READMEs have been removed from the web as they contain unremediated security vulnerabilities. The latest version of Tivoli Storage Manager for Space Management (IBM Spectrum Protect for Space Management) 7.1 is 7.1.6 which contains fixes for the most recent known security and product issues, and can be found using this link:
http://www.ibm.com/support/docview.wss?uid=swg24042243
If you have any questions, please contact IBM support.
6.4 B/A clients in 6.4 TSM for Space Management package6.4.2.2Linux_x86_64IT05713http://www.ibm.com/support/docview.wss?uid=swg24039454
6.3 B/A clients in 6.3 TSM for Space Management package6.3.2.3Linux_x86_64IT05713ftp://public.dhe.ibm.com/storage/tivoli-storage-management/patches/client/v6r3/Linux/LinuxX86/HSMGPFS/v632/
Note that interim fixes 6.3.2.1 through 6.3.2.5 have been removed from the above web site as they contain unremediated security vulnerabilities. The latest interim fix (6.3.2.6) should be used which contains a fix for this security issue as well as fixes for the most recent security and product issues.

Workarounds and Mitigations

Remove the Trusted Communications Agent (TCA), module dsmtca, from the TSM client machine. This will disable all non root users from running the TSM Client.

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

This vulnerability was reported by Matthias Kaiser from Daimler TSS GmbH

Change History

30 Jan 2015: Original text published
26 Feb 2015: Added TSM for Space Management packages and updated Workaround.
13 Mar 2015: Updated xforce link
16 Mar 2015: Customer feedback update - Make it clear in Title and Summary that this is for TSM Linux x86_64 clients only.
16 January 2017: Updated links to fixes.
02 May 2018: Updated client 6.4.2.2 broken link

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SSGSG7","label":"Tivoli Storage Manager"},"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Component":"Client","Platform":[{"code":"PF016","label":"Linux"}],"Version":"6.3;6.4;7.1","Edition":"","Line of Business":{"code":"LOB26","label":"Storage"}},{"Product":{"code":"SSAT9S","label":"IBM System Storage Archive Manager"},"Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Component":"Client","Platform":[{"code":"","label":"Linux\/x86"}],"Version":"6.3;6.4;7.1","Edition":"","Line of Business":{"code":"LOB26","label":"Storage"}},{"Product":{"code":"SSSQWC","label":"Tivoli Storage Manager Extended Edition"},"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Component":null,"Platform":[{"code":"","label":"Linux\/x86"}],"Version":"6.3;6.4;7.1","Edition":"","Line of Business":{"code":"LOB26","label":"Storage"}}]

Document Information

Modified date:
17 June 2018

UID

swg21695715