Lucene search

K
ibmIBM5383834BD699F03CEB23D128CF89319FE2AC37A2CBA3C8B39E3429A84E9781FF
HistorySep 25, 2022 - 8:45 p.m.

Security Bulletin: TSM Client Web GUI Unauthorized Access Vulnerability (CVE-2013-0472)

2022-09-2520:45:36
www.ibm.com
9
tivoli storage manager
unauthorized access
vulnerability
client
web gui
cad scheduling
mitigation

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.001

Percentile

43.7%

Abstract

An unauthorized access vulnerability exists in the IBM Tivoli Storage Manager (TSM) client Web GUI

Content

DESCRIPTION:
A vulnerability in the TSM client Web GUI allows unauthorized access to the TSM server.

**CVEID:*CVE-2013-0472
CVSS Base Score: 5.1
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/81216&gt; for the current score
CVSS Environmental Score
: Undefined
CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:P)

AFFECTED PRODUCTS AND VERSIONS, include only:

  • TSM Client 6.4.0.0
  • TSM Client 6.3.0.x

REMEDIATION:

TSM Release First Fixing VRMF Level Client Platform APAR Link to fix
6.4 6.4.0.1 All IC87210 http://www.ibm.com/support/docview.wss?uid=swg24034276
6.3 6.3.1.0 All IC87210 _<http://www.ibm.com/support/docview.wss?uid=swg24034109&gt;_

Workaround(s):

  • If using client acceptor service (CAD) scheduling, prevent the use of the Web GUI by setting the MANAGEDSERVICES option value to only SCHEDULE.
    In the client option file, specify:
    MANAGEDSERVICES SCHEDULE
  • If using traditional scheduling, disable the CAD service. On Windows, the administrator disables ‘xxxx’ in the TSM Workstation Backup Properties. On UNIX, xxxx. On Macintosh, set the MANAGEDSERVICES option to the value of NONE.

Mitigation(s)****:
See Workarounds above.

REFERENCES:
· Complete CVSS Guide
· On-line Calculator V2_ _
· CVE-2013-0472__ __
· _X-Force Vulnerability Database __<https://exchange.xforce.ibmcloud.com/vulnerabilities/81216&gt;_

RELATED INFORMATION:
_IBM Secure Engineering Web Portal _
IBM Product Security Incident Response Blog

ACKNOWLEDGEMENT
None

CHANGE HISTORY **31 January 2013:**Original Copy Published 07 February 2013: Two changes:
1. Changed the Description to remove the phrase ‘from the local network to files stored on’, to more closely match in words the CVSS score and the X-Force Description
2. Added ‘Only’ to the Releases Affected to make it clear that only 6.3.0.x and 6.4.0.0 are affected.
20 February 2013: Added workaround for CAD schedule users to prevent Web GUI use

_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _

_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY

[{“Product”:{“code”:“SSGSG7”,“label”:“Tivoli Storage Manager”},“Business Unit”:{“code”:“BU058”,“label”:“IBM Infrastructure w/TPS”},“Component”:“Client”,“Platform”:[{“code”:“PF002”,“label”:“AIX”},{“code”:“PF010”,“label”:“HP-UX”},{“code”:“PF016”,“label”:“Linux”},{“code”:“PF014”,“label”:“iOS”},{“code”:“PF027”,“label”:“Solaris”},{“code”:“PF033”,“label”:“Windows”}],“Version”:“6.3;6.4”,“Edition”:“”,“Line of Business”:{“code”:“LOB26”,“label”:“Storage”}},{“Product”:{“code”:“SSSQWC”,“label”:“Tivoli Storage Manager Extended Edition”},“Business Unit”:{“code”:“BU058”,“label”:“IBM Infrastructure w/TPS”},“Component”:“Client”,“Platform”:[{“code”:“PF002”,“label”:“AIX”},{“code”:“PF010”,“label”:“HP-UX”},{“code”:“PF016”,“label”:“Linux”},{“code”:“PF027”,“label”:“Solaris”},{“code”:“PF033”,“label”:“Windows”},{“code”:“PF017”,“label”:“Mac OS”}],“Version”:“6.3;6.4”,“Edition”:“”,“Line of Business”:{“code”:“LOB26”,“label”:“Storage”}},{“Product”:{“code”:“SSAT9S”,“label”:“IBM System Storage Archive Manager”},“Business Unit”:{“code”:“BU058”,“label”:“IBM Infrastructure w/TPS”},“Component”:" “,“Platform”:[{“code”:”“,“label”:”“}],“Version”:“6.3;6.4”,“Edition”:”“,“Line of Business”:{“code”:“LOB26”,“label”:“Storage”}},{“Product”:{“code”:“SSSR2R”,“label”:“Tivoli Storage Manager for Space Management”},“Business Unit”:{“code”:“BU058”,“label”:“IBM Infrastructure w/TPS”},“Component”:” “,“Platform”:[{“code”:“PF002”,“label”:“AIX”},{“code”:“PF016”,“label”:“Linux”}],“Version”:“6.3;6.4”,“Edition”:”",“Line of Business”:{“code”:“LOB26”,“label”:“Storage”}}]

Affected configurations

Vulners
Node
ibmtivoli_storage_managerMatch6.3
OR
ibmtivoli_storage_managerMatch6.4
OR
ibmtivoli_storage_managerMatch6.3
OR
ibmtivoli_storage_managerMatch6.4
OR
ibmsystem_storage_ds3524Match6.3
OR
ibmsystem_storage_ds3524Match6.4
OR
ibmtivoli_storage_manager_for_space_managementMatch6.3
OR
ibmtivoli_storage_manager_for_space_managementMatch6.4
VendorProductVersionCPE
ibmtivoli_storage_manager6.3cpe:2.3:a:ibm:tivoli_storage_manager:6.3:*:*:*:*:*:*:*
ibmtivoli_storage_manager6.4cpe:2.3:a:ibm:tivoli_storage_manager:6.4:*:*:*:*:*:*:*
ibmsystem_storage_ds35246.3cpe:2.3:h:ibm:system_storage_ds3524:6.3:*:*:*:*:*:*:*
ibmsystem_storage_ds35246.4cpe:2.3:h:ibm:system_storage_ds3524:6.4:*:*:*:*:*:*:*
ibmtivoli_storage_manager_for_space_management6.3cpe:2.3:a:ibm:tivoli_storage_manager_for_space_management:6.3:*:*:*:*:*:*:*
ibmtivoli_storage_manager_for_space_management6.4cpe:2.3:a:ibm:tivoli_storage_manager_for_space_management:6.4:*:*:*:*:*:*:*

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.001

Percentile

43.7%

Related for 5383834BD699F03CEB23D128CF89319FE2AC37A2CBA3C8B39E3429A84E9781FF