Security Bulletin
Summary
InstallAnywhere generates installation executables which are vulnerable to an DLL-planting vulnerability.
Vulnerability Details
CVEID: CVE-2016-4560
DESCRIPTION: Flexera InstallAnywhere could allow a local attacker to gain elevated privileges on the system, caused by an untrusted search path. An attacker could exploit this vulnerability using a Trojan horse DLL in the current working directory of a setup-launcher executable file to gain elevated privileges on the system.
CVSS Base Score: 7.80
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/113016 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Affected Products and Versions
FileNet Content Manager 5.1.0, 5.2.0, 5.2.1
IBM Content Foundation 5.2.0, 5.2.1
FileNet Business Process Manager 4.5.1, 5.0.0
All the below Windows releases and prior are affected:
Product | VRMF | Windows releases and prior affected |
FileNet Content Manager | 4.5.1 5.0.0 5.1.0 5.2.0 5.2.1 | 4.5.1.8-P8CE-FP008 5.0.0.4-P8CE-FP004 5.1.0.7-P8CE-FP007 5.2.0.4-P8CPE-FP004 5.2.0.4-P8CaseFoundation-FP004 5.2.1.4-P8CPE-FP004 5.2.1.4-P8CaseFoundation-FP004 5.2.1.4-P8CSS-FP004 |
IBM Content Foundation | 5.2.0 5.2.1 | 5.2.0.4-P8CPE-FP004 5.2.0.4-P8CaseFoundation-FP004 5.2.1.4-P8CPE-FP004 5.2.1.4-P8CaseFoundation-FP004 5.2.1.4-P8CSS-FP004 |
FileNet Business Process Manager | 4.5.1 5.0.0 | 4.5.1.4-P8PE-FP004 5.0.0.10-P8PE-FP010 5.0.0.6-P8CA-FP006 |
Remediation/Fixes
The below table contains the list of current fixes. For releases not on this list, please use the workaround steps.
Product | VRMF | APAR | Remediation/First Fix |
FileNet Content Manager | 5.1.0 5.2.0 5.2.1 | PJ44144 PJ44145 PJ44146 PJ44145 PJ44146 | 5.1.0.7-P8CE-FP007 - 8/11/2017 5.2.0.5-P8CPE-FP005 - 6/3/2016 5.2.0.5-P8CSS-FP005 - 6/3/2016 5.2.1.5-P8CPE-FP005 - 7/14/2016 5.2.1.5-P8CSS-FP005 - 7/14/2016 |
IBM Content Foundation | 5.2.0 5.2.1 | PJ44145 PJ44146 PJ44145 PJ44146 | 5.2.0.5-P8CPE-FP005 - 6/3/2016 5.2.0.5-P8CSS-FP005 - 6/3/2016 5.2.1.5-P8CPE-FP005 - 7/14/2016 5.2.1.5-P8CSS-FP005 - 7/14/2016 |
FileNet Business Process Manager | 4.5.1 5.0.0 | PJ44134 | 4.5.1.4-P8PE-FP004 - 5/22/2013 5.0.0.10-P8PE-FP010 - 8/11/2017 5.0.0.6-P8CA-FP006 - 8/11/2017 |
In the above table, the APAR links will provide more information about the fix.
The links in the Remediation column will take you to the location within IBM Fix Central where you can download the particular fix you need.
Workarounds and Mitigations
Follow the below steps to workaround the InstallAnywhere vulnerability.
Install the fix pack by running the installation wizard or by running a silent installation:
To avoid an untrusted search path vulnerability where users could gain increased privileges, perform the following additional steps:
1) Create a new, empty secure directory in a temporary location.
The directory must not exist before and only the administrator should have write permission to it.
2) Copy or move the installer executable to the new, otherwise empty folder created in Step 1.
3) Ensure there are no DLL files in this directory
4) Launch the installer executable from its new location.
Important: Do not enter line breaks in the command that you enter to start the installation program.
Get Notified about Future Security Bulletins
References
Change History
11 August 2017, 5.0.0.6-P8CA-FP006, 5.0.0.10-P8PE-FP010, 5.1.0.7-P8CE-FP007 released
10 July 2017, removed eProcess since it is out of support.
15 July, 2016: 5.2.1.5 released
10 June, 2016: 5.2.0.5 released
9 May, 2016: InstallAnywhere CVE-2016-4560 issued
29 April, 2016: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
Document Information
Modified date:
17 June 2018
UID
swg21980209