Lucene search

K
ibmIBM5DDB5CECEC283344BB3F493BC01FBE017DB8DDFB43CB94DFA49BBFFB5437AC29
HistorySep 26, 2022 - 10:21 p.m.

Security Bulletin: Tivoli Storage Productivity Center, multiple security vulnerabilities in IBM Tivoli Integrated Portal (CVE-2013-0464, CVE-2012-3325, CVE-2011-4858)

2022-09-2622:21:32
www.ibm.com
31
tivoli storage productivity center
ibm tivoli integrated portal
cross-site scripting
security restrictions bypass
denial of service

EPSS

0.651

Percentile

97.9%

Abstract

Multiple security vulnerabilities exist in the IBM Tivoli Integrated Portal component of Tivoli Storage Productivity Center.

Content

Vulnerability Details:

CVEID: CVE-2013-0464
**Description:**IBM Eclipse Help System, as used in multiple IBM products, is vulnerable to cross-site scripting. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in an affected customerā€™s Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the affected customerā€™s cookie-based authentication credentials.

CVSS Base Score: 4.3
CVSS Temporal Score: See _<https://exchange.xforce.ibmcloud.com/vulnerabilities/81060&gt;_ for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

**
CVEID: **CVE-2012-3325 **
Description: **IBM WebSphere Application Server could allow a remote authenticated attacker to bypass security restrictions, caused by an error when validating user credentials following application of APAR PM44303. An attacker could exploit this vulnerability to gain unauthorized administrative access to the application and potentially gain access to confidential and critical customer data.

CVSS Base Score: 6.0
CVSS Temporal Score: See _<https://exchange.xforce.ibmcloud.com/vulnerabilities/77959&gt;_ for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:S/C:P/I:P/A:P)

**
CVEID: **CVE-2011-4858 **
Description: **Apache Tomcat is vulnerable to a denial of service, caused by insufficient randomization of hash data structures. By sending multiple specially-crafted HTTP POST requests to an affected application containing conflicting hash key values, a remote attacker could exploit this vulnerability to cause the consumption of CPU resources.

CVSS Base Score: 5.0
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/72016&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

**
Affected Products And Versions: **
Tivoli Storage Productivity Center 5.1.0
Tivoli Storage Productivity Center 4.2.0 through 4.2.2.145
Tivoli Storage Productivity Center 4.1.0 through 4.1.1.126
System Storage Productivity Center (Refer to the Tivoli Storage Productivity Center version installed.)

Note: Tivoli Storage Productivity version 5.1.1 and higher are not affected.

**
Remediation: **
Upgrade Tivoli Storage Productivity Center to update the Tivoli Integrated Portal component.

Affected TPC Version APAR Fixed TPC Version Availability
5.1.0 IC94722 5.1.1.0 December 2012
4.2.x
4.1.x IC94723 4.2.2.170 (FP4) June 2013

Latest Downloads for Tivoli Storage Productivity Center

**
Workaround(s):**
None

**
Mitigation(s):**
None

**
References: **

**
Related Information: **

**
Acknowledgement:**
None

Change History:
None

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.
_
Note: _
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an ā€œindustry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.ā€ IBM PROVIDES THE CVSS SCORES ā€œAS ISā€ WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{ā€œProductā€:{ā€œcodeā€:ā€œSS5R93ā€,ā€œlabelā€:ā€œIBM Spectrum Controlā€},ā€œBusiness Unitā€:{ā€œcodeā€:ā€œBU058ā€,ā€œlabelā€:ā€œIBM Infrastructure w/TPSā€},ā€œComponentā€:ā€œā€“ā€,ā€œPlatformā€:[{ā€œcodeā€:ā€œPF002ā€,ā€œlabelā€:ā€œAIXā€},{ā€œcodeā€:ā€œPF016ā€,ā€œlabelā€:ā€œLinuxā€},{ā€œcodeā€:ā€œPF033ā€,ā€œlabelā€:ā€œWindowsā€}],ā€œVersionā€:ā€œ5.1;5.1.1ā€,ā€œEditionā€:ā€œā€,ā€œLine of Businessā€:{ā€œcodeā€:ā€œLOB26ā€,ā€œlabelā€:ā€œStorageā€}},{ā€œProductā€:{ā€œcodeā€:ā€œSS5R93ā€,ā€œlabelā€:ā€œIBM Spectrum Controlā€},ā€œBusiness Unitā€:{ā€œcodeā€:ā€œBU058ā€,ā€œlabelā€:ā€œIBM Infrastructure w/TPSā€},ā€œComponentā€:" ā€œ,ā€œPlatformā€:[{ā€œcodeā€:ā€œPF002ā€,ā€œlabelā€:ā€œAIXā€},{ā€œcodeā€:ā€œPF016ā€,ā€œlabelā€:ā€œLinuxā€},{ā€œcodeā€:ā€œPF033ā€,ā€œlabelā€:ā€œWindowsā€}],ā€œVersionā€:ā€œ4.1;4.1.1;4.2;4.2.1;4.2.2ā€,ā€œEditionā€:ā€ā€œ,ā€œLine of Businessā€:{ā€œcodeā€:ā€œLOB26ā€,ā€œlabelā€:ā€œStorageā€}},{ā€œProductā€:{ā€œcodeā€:ā€œSS2JZWā€,ā€œlabelā€:ā€œTivoli Storage Productivity Center Selectā€},ā€œBusiness Unitā€:{ā€œcodeā€:ā€œBU058ā€,ā€œlabelā€:ā€œIBM Infrastructure w/TPSā€},ā€œComponentā€:ā€ ā€œ,ā€œPlatformā€:[{ā€œcodeā€:ā€œPF033ā€,ā€œlabelā€:ā€œWindowsā€},{ā€œcodeā€:ā€œPF002ā€,ā€œlabelā€:ā€œAIXā€},{ā€œcodeā€:ā€œPF016ā€,ā€œlabelā€:ā€œLinuxā€}],ā€œVersionā€:ā€œ4.1;4.1.1;4.2;4.2.1;4.2.2ā€,ā€œEditionā€:ā€",ā€œLine of Businessā€:{ā€œcodeā€:ā€œLOB26ā€,ā€œlabelā€:ā€œStorageā€}}]