Lucene search

K
ibmIBM31FD2B7CD4D3483EC0F51C9DB001AEF8D83A9B046D10FDCF697C4138C9A2C19F
HistoryJun 17, 2018 - 2:42 p.m.

Security Bulletin: IBM Tivoli Composite Application Manager for Transactions is affected by a Local escalation of privilege vulnerability (CVE-2014-0907)

2018-06-1714:42:51
www.ibm.com
7

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

14.0%

Summary

A vulnerability in IBM Tivoli Composite Application Manager for Transactions on Linux, Solaris and AIX could allow a local user to gain elevated privilege.

Vulnerability Details

CVE-ID:CVE-2014-0907

**DESCRIPTION:**The IBM Tivoli Composite Application Manager for Transactions products listed below contain a security vulnerability which allows a malicious user to gain root privilege. This vulnerability can only be exploited by users through a local system account login.

CVSS Base Score: 6.9
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/91869&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:L/AC:M/Au:N/C:C/I:C/A:C)

Affected Products and Versions

IBM Tivoli Composite Application Manager (ITCAM) for Transactions is affected. ITCAM for Transactions contains multiple sub components (Agents). Only the Internet Service Monitor (ISM โ€“ Agent code โ€˜ISโ€™) on AIX, Solaris and Linux is affected. Windows is not affected.

Versions:
ยท 7.4
ยท 7.3
ยท 7.2
ยท 7.1

Remediation/Fixes

Product

| VRMF| APAR| Remediation/First Fix
โ€”|โ€”|โ€”|โ€”
7.4.0.0-TIV-CAMIS-IF0013| 7.4.0.0| None| http://www.ibm.com/support/docview.wss?uid=isg400001841
7.3.0.1-TIV-CAMIS-IF0029| 7.3.0.1| None| http://www.ibm.com/support/docview.wss?uid=isg400001843
7.2.0.3-TIV-CAMIS-IF0026| 7.2.0.3| None| http://www.ibm.com/support/docview.wss?uid=isg400001816
Will Not Fix| 7.1.0.0| None| Upgrade to 7.4.0.0-TIV-CAMIS-IF0013

Workarounds and Mitigations

It is possible for system administrators to lock down binaries paths via setting RPATH utilities (e.g. patchelf on Linux, chrpath on Solaris, db2chglibpath on AIX). This will completely negate the vulnerability.

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

14.0%

Related for 31FD2B7CD4D3483EC0F51C9DB001AEF8D83A9B046D10FDCF697C4138C9A2C19F