Security Bulletin
Summary
There are multiple vulnerabilities in IBM® Runtime Environment Java™ used by IBM Spectrum Protect Snapshot (formerly Tivoli Storage FlashCopy Manager) for VMware. These issues were disclosed as part of the IBM Java SDK updates in October 2017.
Vulnerability Details
CVEID: CVE-2017-10356
DESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java SE, Java SE Embedded, JRockit Security component could allow an unauthenticated attacker to obtain sensitive information resulting in a high confidentiality impact using unknown attack vectors.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/133785 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
Affected Products and Versions
The following levels of IBM Spectrum Protect Snapshot (formerly Tivoli Storage FlashCopy Manager) for VMware are affected:
- 4.1.0.0 through 4.1.6.3
- 3.2 and below (all levels) - these releases are EOS
Remediation/Fixes
IBM Spectrum Protect Snapshot (formerly Tivoli Storage FlashCopy Manager) for VMware Release | First Fixing VRMF Level | Platform | Link to Fix / Fix Availability Target |
4.1 | 4.1.6.4 | Linux | http://www.ibm.com/support/docview.wss?uid=swg24044554 |
3.2 and below | Release 3.2 and below are EOS. Customers on these releases should upgrade to 4.1.6.4 or higher. |
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
References
Change History
14 February 2018 - Original version published
02 May 2018 - Corrected platform in Cross Reference to Linux
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
Document Information
Modified date:
01 February 2022
UID
swg22013544