Lucene search

K
ibmIBM90CFB9B81B5299E4356A5F0999F149321228FAC5F22748DCEBF354DC2C0813B5
HistoryJun 17, 2018 - 3:23 p.m.

Security Bulletin: Vulnerability in InstallShield affects IBM Tivoli Storage Manager for Mail: Data Protection for Domino (CVE-2016-2542)

2018-06-1715:23:51
www.ibm.com
4

0.0004 Low

EPSS

Percentile

5.1%

Summary

InstallShield generates installation executables which are vulnerable to a DLL-planting that affects IBM Tivoli Storage Manager for Mail: Data Protection for Domino (IBM Spectrum Protect for Mail) on Windows platforms.

Vulnerability Details

CVEID: CVE-2016-2542** *DESCRIPTION: Flexera InstallShield could allow a local attacker to gain elevated privileges on the system, caused by an untrusted search path. An attacker could exploit this vulnerability using a Trojan horse DLL in the current working directory of a setup-launcher executable file to gain elevated privileges on the system.
CVSS Base Score: 7.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/110914 for the current score
CVSS Environmental Score
: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

The following levels of IBM Tivoli Storage Manager for Mail: Data Protection for Domino (IBM Spectrum Protect for Mail) are affected on the Windows platform:

  • 7.1.0.0 through 7.1.0.2
  • 6.3.0.0 through 6.3.1.2
  • 5.5 all levels (this release is EOS)

Remediation/Fixes

This security exposure occurs only at installation time and does not affect an already installed Tivoli Storage Manager for Mail: Data Protection for Domino.

If you are not installing a fixed level of Tivoli Storage Manager for Mail: Data Protection for Domino (7.1.0.3 or 6.3.1.3), then the installation package is vulnerable to this security issue during installation and you must use the workaround provided below to prevent being exposed to the vulnerability.

Tivoli Storage Manager for Mail: Data Protection for Domino Release|First
Fixing
VRM Level
|Platform|Link to Fix / Fix Availability Target
—|—|—|—
7.1| 7.1.0.3| Windows x86
Windows x64| <ftp://public.dhe.ibm.com/storage/tivoli-storage-management/patches/tivoli-data-protection/domino/windows/v7103/&gt;
6.3| 6.3.1.3| Windows x32

Windows x64| <ftp://public.dhe.ibm.com/storage/tivoli-storage-management/patches/tivoli-data-protection/domino/windows/x32/v6313/&gt;
<ftp://public.dhe.ibm.com/storage/tivoli-storage-management/patches/tivoli-data-protection/domino/windows/x64/v6313/&gt;
5.5| None| Windows x32
Windows x64| Upgrade to a fixed level (7.1.0.3 or 6.3.1.3) or use the workaround provided below.

Workarounds and Mitigations

This security exposure occurs only at installation time and does not affect an already installed Tivoli Storage Manager for Mail: Data Protection for Domino.

To prevent exposure to this security vulnerability, download and run the installation package from a clean directory using the following steps:

  1. As an administrator, create a new secure directory. The directory must not exist before and only the administrator should have write permission to it.
  2. Unzip or copy the files from your installation media into this new directory.
  3. Run the installation exe from this directory to install the product. Proceed with the installation as normal.

If installation of a Tivoli Storage Manager for Mail: Data Protection for Domino package below the fixing level (7.1.0.3 or 6.3.1.3) or installation of a package for release 5.5 is required, then the above workaround should be used to avoid exposure to this vulnerability during the installation process. The workaround is not needed if the fixing level (7.1.0.3 or 6.3.1.3) or a higher level of the package is installed.

0.0004 Low

EPSS

Percentile

5.1%

Related for 90CFB9B81B5299E4356A5F0999F149321228FAC5F22748DCEBF354DC2C0813B5