Lucene search

K
ibmIBM188A70C538E6CB831090916E11FCBC7A7A09A9BB50448CC94B3288A78E0E8551
HistoryJan 16, 2019 - 10:00 p.m.

Security Bulletin: Password disclosure via trace log in IBM Spectrum Protect (formerly Tivoli Storage Manager) Server (CVE-2018-1788)

2019-01-1622:00:01
www.ibm.com
8

0.0004 Low

EPSS

Percentile

5.1%

Summary

When tracing is enabled, some passwords may be displayed in the IBM Spectrum Protect (formerly Tivoli Storage Manager) Server trace file.
UPDATED 1/16/2019: Changed “First Fixing VRM Level” in Remediation/Fixes table for 8.1 from 8.1.6 to 8.1.6.100

Vulnerability Details

CVEID: CVE-2018-1788 DESCRIPTION: IBM Spectrum Protect Server could disclose highly sensitive information via trace logs to a local user.
CVSS Base Score: 4.1
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/148873&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

This vulnerability affects the following IBM Spectrum Protect (formerly Tivoli Storage Manager) Server levels:

  • 8.1.0.0 through 8.1.5.x
  • 7.1.0.0 through 7.1.9.0

Remediation/Fixes

IBM Spectrum Protect
Server Release
| First Fixing
VRM Level
| Platform | Link to Fix
—|—|—|—
8.1 | 8.1.6.100 | AIX
Linux
Windows | <ftp://public.dhe.ibm.com/storage/tivoli-storage-management/patches/server&gt;
7.1 | 7.1.9.100 | AIX
HP-UX
Linux
Solaris
Windows | <ftp://public.dhe.ibm.com/storage/tivoli-storage-management/patches/server&gt;

.

Workarounds and Mitigations

Tracing is disabled by default. It is normally enabled only when directed by IBM support to troubleshoot an issue. To minimize exposure to this vulnerability, disable tracing unless required and securely delete trace files that are no longer needed.

0.0004 Low

EPSS

Percentile

5.1%

Related for 188A70C538E6CB831090916E11FCBC7A7A09A9BB50448CC94B3288A78E0E8551