Lucene search

K
ibmIBM35A6679413C38C3D43ACEAE0FBDB3842B1C54FB3DAA9DC84A9AECF3FCCBF042A
HistoryMar 09, 2021 - 6:38 p.m.

Security Bulletin: IBM Verify Gateway PAM components do not set restricted access permission for debug logs (CVE-2020-4405)

2021-03-0918:38:28
www.ibm.com
8
ibm verify gateway
pam components
debug logs
vulnerability
world readable
access permissions
remediation
workarounds

EPSS

0.001

Percentile

19.6%

Summary

To debug the IBM Verify Gateway (IVG) PAM components, customers can add β€œtrace-file” parameters in the PAM configuration so that .log files are written to the /tmp directory. These debug logs potentially contain sensitive information, and yet they default to world readable. They should have stricter access permissions. As of v1.0.1 of IVG for AIX PAM, and v1.0.2 of IVG for Linux PAM, the logs are no longer world readable.

Vulnerability Details

CVEID:CVE-2020-4405
**DESCRIPTION:**IBM Verify Gateway (IVG) could disclose potentially sensitive information to an authenticated user due to world readable log files.
CVSS Base score: 3.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/179484 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Verify Gateway (IVG) PAM 1.0.0, 1.0.1

Remediation/Fixes

Log in to IBM X-Force Exchange / App Exchange and download and install the latest IBM Security Verify Gateway (renamed from IBM Verify Gateway) PAM components. Specifically:

Workarounds and Mitigations

Use the chmod command to restrict access to PAM’s β€œtrace-file” logs in the /tmp directory.

EPSS

0.001

Percentile

19.6%

Related for 35A6679413C38C3D43ACEAE0FBDB3842B1C54FB3DAA9DC84A9AECF3FCCBF042A