Lucene search

K
ibmIBM3902DBBE8ED85E0A5DB6E5634272A0B8246DA77F759412F10E44CCD9853FFD62
HistoryJun 17, 2018 - 3:16 p.m.

Security Bulletin: A vulnerability in the GSKit component of IBM Tivoli Storage FlashCopy Manager for UNIX and VMware (CVE-2016-0201)

2018-06-1715:16:55
www.ibm.com
11

EPSS

0.003

Percentile

68.2%

Summary

A vulnerability has been addressed in the GSKit component of IBM Tivoli Storage FlashCopy Manager (IBM Spectrum Protect Snapshot) for UNIX and VMware.

Vulnerability Details

CVEID: CVE-2016-0201**
DESCRIPTION:** IBM GSKit could allow a remote attacker to obtain sensitive information, caused by a MD5 collision. An attacker could exploit this vulnerability to obtain authentication credentials.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/109310 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

The following IBM FlashCopy Manager (IBM Spectrum Protect Snapshot) components are affected:

VMware:

  • FlashCopy Manager for VMware versions
    - 4.1.0.0 through 4.1.4.0
    - 3.2.0.0 through 3.2.0.6

UNIX and Linux

  • FlashCopy Manager for DB2 versions
    - 4.1.0.0 through 4.1.4.x
    - 3.2.0.0 through 3.2.0.7
  • FlashCopy Manager for Custom Applications versions
    - 4.1.0.0 through 4.1.4.x
    - 3.2.0.0 through 3.2.0.7
  • FlashCopy Manager for Oracle versions
    - 4.1.0.0 through 4.1.4.x
    - 3.2.0.0 through 3.2.0.7
  • FlashCopy Manager for Oracle (with SAP environments) versions
    - 4.1.0.0 through 4.1.4.x
    - 3.2.0.0 through 3.2.0.7

Remediation/Fixes

Tivoli Storage FlashCopy Manager for VMware Release

| First
Fixing
VRM Level
|Platform|Link to Fix / Fix Availability Target
—|—|—|—
4.1| 4.1.4.1| Linux| http://www.ibm.com/support/docview.wss?uid=swg24041991
3.2| 3.2.0.7| Linux| http://www.ibm.com/support/docview.wss?uid=swg24041901

Tivoli Storage FlashCopy Manager for Unix Release|First
Fixing
VRM Level
|Platform|Link to Fix / Fix Availability Target
—|—|—|—
4.1| 4.1.6| AIX
Linux
HP-UX
Solaris| http://www.ibm.com/support/docview.wss?uid=swg24042168
3.2| 3.2.0.8| AIX
Linux
HP-UX
Solaris| http://www.ibm.com/support/docview.wss?uid=swg24042460

Workarounds and Mitigations

FlashCopy Manager (FCM) as delivered uses TLS 1.1 and lower protocols for SSL sessions. The GSKit component of FCM is only vulnerable to this security issue if SSL sessions use TLS 1.2 (or higher) protocol.

No action is required if the profile parameter ENFORCE_TLS12 is not present (this is the default) or is set to NO in the FCM profile.

If the ENFORCE_TLS12 parameter is set to YES, then it should be changed to NO to eliminate exposure to this security issue and the processes should be restarted by running the following commands:

setup_<application>.sh -a stop
setup_<application>.sh -a start

The script “setup_<application>.sh” is located in the FCM instance directory. The value of <application> depends on the Database/Application type being protected and is “db2” for a DB2 database, “ora” for Oracle with and without SAP, or “gen” for custom applications.

EPSS

0.003

Percentile

68.2%

Related for 3902DBBE8ED85E0A5DB6E5634272A0B8246DA77F759412F10E44CCD9853FFD62