When application tracing is enabled and a password change operation is performed, the Tivoli Storage Manager (IBM Spectrum Protect) password is displayed in plain text in the trace output.
CVEID: CVE-2016-0371**
DESCRIPTION:** The Tivoli Storage Manager (TSM) password may be displayed in plain text via application trace output while application tracing is enabled.
CVSS Base Score: 5.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/112090 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
The following levels of IBM Tivoli Storage Manager (IBM Spectrum Protect) Client are affected:
Tivoli Storage Manager Client Release
| First
Fixing
VRM Level|Platform|Link to Fix / Fix Availability Target
—|—|—|—
7.1| 7.1.6.3| AIX
HP-UX
Linux
Macintosh
Solaris
Windows| http://www.ibm.com/support/docview.wss?uid=swg24042496
6.4| 6.4.3.4| AIX
HP-UX
Linux
Macintosh
Solaris
Windows| http://www.ibm.com/support/docview.wss?uid=swg24041144
6.3| 6.3.2.6| AIX
HP-UX
Linux
Macintosh
Solaris
Windows| http://www.ibm.com/support/docview.wss?uid=swg24037930
6.2, 6.1, and 5.5| None| AIX
HP-UX
Linux
Macintosh
Solaris
Windows| Upgrade to a fixed level (7.1.6.3, 6.4.3.4, or 6.3.2.6) or use the workaround provided below.
Tracing is disabled by default. It is normally enabled only when directed by IBM support to troubleshoot an issue.
To minimize exposure to this vulnerability, disable tracing unless required and delete trace files that are no longer needed.