IBM Support

Security Bulletin: Vulnerability CVE-2019-4031 affects IBM Workload Scheduler

Security Bulletin


Summary

Vulnerability CVE-2019-4031 affects IBM Workload Scheduler because a local user could launch taskLauncher program and create or replace files created by root user escalating privileges.

Vulnerability Details

CVEID: CVE-2019-4031
DESCRIPTION: IBM Tivoli Workload Scheduler contains a vulnerability that could allow a local user to write files as root in the file system, which could allow the attacker to gain root privileges.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/155997 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Tivoli Workload Scheduler Distributed 9.2.0 FP03 and earlier
IBM Workload Scheduler Distributed 9.3.0 FP03 and earlier
IBM Workload Scheduler Distributed 9.4.0 FP05 and earlier
IBM Workload Scheduler Distributed 9.5.0 GA

Remediation/Fixes

APAR IJ15085 addresses CVE-2019-4031 vulnerability for IBM Workload Scheduler.
The following limited availability fixes for IJ15085 are available for download on FixCentral
9.2.0-TIV-TWS-FP0003-IJ15085 
To be applied on top of Tivoli Workload Scheduler Distributed 9.2.0 FP03
9.3.0-TIV-TWS-FP0003-IJ15085 
To be applied on top of Tivoli Workload Scheduler Distributed 9.3.0 FP03

APAR IJ15085 is already included in IWS 9.4.0 FP06 and IWS 9.5.0 FP01.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

The vulnerability was reported to IBM by Davide Cioccia - Senior Security Engineer at ING

Change History

Oct 1 2019 original version

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Product":{"code":"SSGSPN","label":"IBM Workload Scheduler"},"Component":"","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF010","label":"HP-UX"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"}],"Version":"9.2;9.3;9.4;9.5","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
09 October 2019

UID

ibm11076775