IBM Support

Security Bulletin: Password Disclosure via application tracing in IBM Tivoli Storage Manager Client (CVE-2016-0371)

Security Bulletin


Summary

When application tracing is enabled and a password change operation is performed, the Tivoli Storage Manager (IBM Spectrum Protect) password is displayed in plain text in the trace output.

Vulnerability Details

CVEID: CVE-2016-0371
DESCRIPTION:
The Tivoli Storage Manager (TSM) password may be displayed in plain text via application trace output while application tracing is enabled.
CVSS Base Score: 5.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/112090 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

The following levels of IBM Tivoli Storage Manager (IBM Spectrum Protect) Client are affected:

  • 7.1.0.0 through 7.1.6.2
  • 6.4.0.0 through 6.4.3.3
  • 6.3.0.0 through 6.3.2.5
  • 6.2, 6.1, and 5.5 all levels (these releases are EOS)

Remediation/Fixes

Tivoli Storage Manager Client Release

First
Fixing
VRM Level
PlatformLink to Fix / Fix Availability Target
7.17.1.6.3AIX
HP-UX
Linux
Macintosh
Solaris
Windows
http://www.ibm.com/support/docview.wss?uid=swg24042496
6.46.4.3.4AIX
HP-UX
Linux
Macintosh
Solaris
Windows
http://www.ibm.com/support/docview.wss?uid=swg24041144
6.36.3.2.6AIX
HP-UX
Linux
Macintosh
Solaris
Windows
http://www.ibm.com/support/docview.wss?uid=swg24037930
6.2, 6.1, and 5.5NoneAIX
HP-UX
Linux
Macintosh
Solaris
Windows
Upgrade to a fixed level (7.1.6.3, 6.4.3.4, or 6.3.2.6) or use the workaround provided below.

Workarounds and Mitigations

Tracing is disabled by default. It is normally enabled only when directed by IBM support to troubleshoot an issue.

To minimize exposure to this vulnerability, disable tracing unless required and delete trace files that are no longer needed.

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

None

Change History

02 November 2016 - Original version published.

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SSGSG7","label":"Tivoli Storage Manager"},"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Component":"Client","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF010","label":"HP-UX"},{"code":"PF016","label":"Linux"},{"code":"PF022","label":"OS X"},{"code":"PF027","label":"Solaris"},{"code":"PF033","label":"Windows"}],"Version":"5.5;6.1;6.2;6.3;6.4;7.1","Edition":"All Editions","Line of Business":{"code":"LOB26","label":"Storage"}},{"Product":{"code":"SSSQWC","label":"Tivoli Storage Manager Extended Edition"},"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Component":"Client","Platform":[{"code":"PF033","label":"Windows"}],"Version":"5.5;6.1;6.2;6.3;6.4;7.1","Edition":"All Editions","Line of Business":{"code":"LOB26","label":"Storage"}}]

Document Information

Modified date:
17 June 2018

UID

swg21985114