Lucene search

K
ibmIBMCD4284E5C30AD5128C79748CA4D5DC6983F04EB28BF222A855C5719910E99C0A
HistoryJun 17, 2018 - 3:15 p.m.

Security Bulletin: A vulnerability in the GSKit component of IBM Tivoli Continuous Data Protection for Files (CVE-2016-0201)

2018-06-1715:15:51
www.ibm.com
6

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

Summary

A vulnerability has been addressed in the GSKit component in the underlying Tivoli Storage Manager API included in IBM Tivoli Continous Data Protection for Files.

Vulnerability Details

CVEID: CVE-2016-0201 DESCRIPTION: IBM GSKit could allow a remote attacker to obtain sensitive information, caused by a MD5 collision. An attacker could exploit this vulnerability to obtain authentication credentials.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/109310 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

IBM Tivoli Continuous Data Protection for Files 6.3.1.0 through 6.3.1.16

Remediation/Fixes

Product

| VRMF| First Fixing VRMF level| APAR| Link to Fix / Fix Availability Target
—|—|—|—|—
IBM Tivoli Continuous Data Protection for Files

|

6.3

|

6.3.1.17

| None

| Windows x86:
[http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FTivoli%2FTivoli+Continuous+Data+Protection+for+Files&fixids=6.3.1-TIV-CDP-x86_windows-FP0017&source=SAR](<http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FTivoli%2FTivoli+Continuous+Data+Protection+for+Files&fixids=6.3.1-TIV-CDP-x86_windows-FP0017&source=SAR>)``
Windows x86 Starter Edition: ``[http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FTivoli%2FTivoli+Continuous+Data+Protection+for+Files&fixids=6.3.1-TIV-CDP-SE-x86_windows-FP0017&source=SAR](<http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FTivoli%2FTivoli+Continuous+Data+Protection+for+Files&fixids=6.3.1-TIV-CDP-SE-x86_windows-FP0017&source=SAR>)``
Windows x64:
[http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FTivoli%2FTivoli+Continuous+Data+Protection+for+Files&fixids=6.3.1-TIV-CDP-x64_windows-FP0017&source=SAR](<http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FTivoli%2FTivoli+Continuous+Data+Protection+for+Files&fixids=6.3.1-TIV-CDP-x64_windows-FP0017&source=SAR>)``
Windows x64 Starter Edition: ``[http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FTivoli%2FTivoli+Continuous+Data+Protection+for+Files&fixids=6.3.1-TIV-CDP-SE-x64_windows-FP0017&source=SAR](<http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FTivoli%2FTivoli+Continuous+Data+Protection+for+Files&fixids=6.3.1-TIV-CDP-SE-x64_windows-FP0017&source=SAR>)

Workarounds and Mitigations

IBM Tivoli Continuous Data Protection for Files is affected by this vulnerability only when using the Tivoli Storage Manager (TSM) Server as a remote backup location and TLS 1.2 (or higher) protocols are used by TSM for SSL sessions. TSM as delivered uses TLS 1.1 and lower protocols for SSL sessions. The GSKit component of TSM is only vulnerable to this security issue if SSL sessions use TLS 1.2 (or higher) protocol.

No action is required if IBM Tivoli Continuous Data Protection for Files is not using the TSM Server as a remote backup location.

No action is required if the TSM Server is being used as a remote backup location and the following conditions are both true:

  • The SSLTLS12 and SSLDISABLELEGACYTLS parameters are not present (this is the default) or are both parameters are set to NO in the TSM server options file. The TSM server options file is located in the dsmserv.opt file in the server instance directory.

  • The SSLDISABLELEGACYTLS parameter is not present (this is the default) or is set to NO in the TSM client options file. The TSM client options file is located in file dsm.opt in the install directory.

If the values for the above parameters are set to YES, then they should be changed to NO to eliminate exposure to this security issue.

In the TSM server options file (dsmserv.opt), specify the following parameters:

SSLTLS12 no
SSLDISABLELEGACYTLS no

In the TSM client options files, specify the following parameters in file dsm.opt file in the install directory:

SSLDISABLELEGACYTLS no

If these parameters are changed, the TSM server must be recycled.

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

Related for CD4284E5C30AD5128C79748CA4D5DC6983F04EB28BF222A855C5719910E99C0A