Lucene search

K
ibmIBMA30C85F440A66D5BA91F7046F08CDA023E3869566E5E88766B02757A0673482C
HistorySep 25, 2022 - 11:13 p.m.

Security Bulletin: Elevated privileges vulnerability in Connect:Direct for UNIX on AIX 6.1 and above (CVE-2013-2989)

2022-09-2523:13:40
www.ibm.com
3
connect:direct
unix
aix 6.1
vulnerability
file system
permissions
cve-2013-2989
ibm
sterling
security

6.8 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:S/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.1%

Abstract

A user who has been successfully authenticated by Connect:Direct for UNIX executes Connect:Direct’s file copying functionality with elevated file system privileges.

Content

VULNERABILITY DETAILS:

CVE ID: CVE-2013-2989

DESCRIPTION: A user who has been successfully authenticated by Connect:Direct for UNIX executes Connect:Direct for UNIX’s file copying functionality with elevated file system privileges. An authenticated user can exploit the vulnerability to bypass file system permissions: the user can read a file without having read permission and overwrite a file without having write permission. The vulnerability only occurs on AIX 6.1 and above.

CVSS:
CVSS Base Score: 6.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/84016 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:L/AC:L/Au:S/C:C/I:C/A:C)
**
AFFECTED VERSIONS:**
All versions.
**
REMEDIATION:**
The recommended solution is to apply the fix for each version as soon as practical. See below for information on the available fixes.
· Version 4.1.0: apply the iFix for IC86449 or any iFix dated 24 January 2013 or later.
· Version 4.0.00: apply the iFix for IC86449 or any iFix dated 10 September 2012 or later.
· Version 3.8.00: apply the iFix for IC86449 or any iFix dated 1 February 2013 or later.

WORKAROUND(S):
• None known.

MITIGATION(S):
• Until the fix is applied, for each user defined in the Connect:Direct User File, use Connect:Direct’s User Authorities to restrict the access of the user to the appropriate part of the file system for that user.

REFERENCES:
Complete CVSS Guide
On-line Calculator V2
X-Force Vulnerability Database
CVE-2013-2989

RELATED INFORMATION:
IBM Secure Engineering Web Portal
_IBM Product Security Incident Response Blog _

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.

Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY

[{“Product”:{“code”:“SSKTYY”,“label”:“IBM Sterling Connect:Direct for UNIX”},“Business Unit”:{“code”:“BU059”,“label”:“IBM Software w/o TPS”},“Component”:“Not Applicable”,“Platform”:[{“code”:“PF002”,“label”:“AIX”}],“Version”:“4.1;4.0;3.8”,“Edition”:“”,“Line of Business”:{“code”:“LOB59”,“label”:“Sustainability Software”}}]

Affected configurations

Vulners
Node
ibmsterling_connect\Matchdirect_for_unix4.1
OR
ibmsterling_connect\Matchdirect_for_unix4.0
OR
ibmsterling_connect\Matchdirect_for_unix3.8

6.8 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:S/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.1%

Related for A30C85F440A66D5BA91F7046F08CDA023E3869566E5E88766B02757A0673482C