IBM Support

Security Bulletin: Node.js lodash vulnerability affects IBM Spectrum Control (formerly Tivoli Storage Productivity Center) ( CVE-2019-10744)

Security Bulletin


Summary

Node.js lodash denial of service vulnerability affects IBM Spectrum Control (formerly Tivoli Storage Productivity Center).

Vulnerability Details

CVEID:   CVE-2019-10744
DESCRIPTION:   Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/167415 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)

Affected Products and Versions

Affected Product(s)Version(s)
Spectrum Control5.3.0 - 5.3.4

Remediation/Fixes

The solution is to apply an appropriate IBM Spectrum Control fix. Click on the download link and follow the Installation Instructions. The solution should be implemented as soon as practicable.

Starting with 5.2.8, Tivoli Storage Productivity Center has been renamed to IBM Spectrum Control.

 ReleaseFirst Fixing
VRM Level
 Link to Fix/Fix Availability Target
 5.3 5.3.5 http://www.ibm.com/support/docview.wss?uid=swg21320822#53_0

Note: It is always recommended to have a current backup before applying any update procedure.

Workarounds and Mitigations

The solution is to apply an appropriate IBM Spectrum Control fix. Click on the download link and follow the Installation Instructions. The solution should be implemented as soon as practicable.

Starting with 5.2.8, Tivoli Storage Productivity Center has been renamed to IBM Spectrum Control.

 ReleaseFirst Fixing
VRM Level
 Link to Fix/Fix Availability Target
 5.3 5.3.5 http://www.ibm.com/support/docview.wss?uid=swg21320822#53_0

Note: It is always recommended to have a current backup before applying any update procedure.

Get Notified about Future Security Bulletins

References

Off

Change History

08 Nov 2019: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Product":{"code":"SS5R93","label":"IBM Spectrum Control"},"Component":"N\/A","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"}],"Version":"5.3.1, 5.3.2, 5.3.3, 5.3.4","Edition":"ALL","Line of Business":{"code":"LOB26","label":"Storage"}}]

Document Information

Modified date:
22 February 2022

UID

ibm11104753