Security Bulletin
Summary
A vulnerability in the IBM Tivoli Storage Manager (TSM) client could allow a local user to gain elevated privileges due to a stack-based buffer overflow.
Vulnerability Details
CVEID: CVE-2014-6184
DESCRIPTION:
IBM Tivoli Storage Manager is vulnerable to a stack buffer overflow. A local attacker could overflow a buffer and execute arbitrary code on the system with root privileges.
CVSS Base Score: 7.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/98520 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:C )
Affected Products and Versions
- TSM Client 6.3.0.0 through 6.3.2.2
- TSM Client 6.2.0.0 through 6.2.5.3
- TSM Client 6.1.0.0 through 6.1.5.6
- TSM Client 5.5.0.0 through 5.5.4.3
- TSM Client 5.4.0.0 through 5.4.3.6
Remediation/Fixes
TSM Release | First Fixing VRMF Level | Client Platform | APAR | Link to fix |
6.3 | 6.3.2.3 | AIX HP-UX Linux Solaris Mac | IT05707 | http://www.ibm.com/support/docview.wss?uid=swg24037930 |
6.2 | 6.2.5.4 | AIX HP-UX Linux Solaris Mac | IT05707 | http://www.ibm.com/support/docview.wss?uid=swg24036287 |
6.1 | 6.1.5.7 | AIX HP-UX Linux Solaris Mac | IT05707 | Customers with support extensions on 6.1 should contact IBM Support. |
5.5 | 5.5.4.4 | AIX HP-UX Linux Solaris Mac | IT05707 | Customers with support extensions on 5.5 should contact IBM Support. |
5.4 | 5.4.3.7 | AIX HP-UX Linux Solaris Mac | IT05707 | Customers with support extensions on 5.4 should contact IBM Support. |
6.3 B/A clients in 6.3 TSM for Space Management package | 6.3.2.3 | AIX Linux x86 | IT05707 | http://www.ibm.com/support/docview.wss?uid=swg24038153 |
6.2 B/A clients in 6.2 TSM for Space Management package | 6.2.5.4 | AIX Linux x86 | IT05707 | http://www.ibm.com/support/docview.wss?uid=swg24036287 |
6.1 B/A clients in 6.1 TSM for Space Management package | 6.1.5.7 | HP-UX Solaris | IT05707 | http://www.ibm.com/support/docview.wss?uid=swg24031758 |
6.1 B/A clients in 6.1 TSM for Space Management package | none, beyond support | AIX Linux x86 | Upgrade to fixing level or apply workaround. | |
5.5 and lower B/A clients and 5.5 and lower TSM Space Management | none, beyond support | AIX Linux x86 HP-UX Solaris | Upgrade to fixing level or apply workaround. |
Workarounds and Mitigations
Remove the Trusted Communications Agent (TCA), module dsmtca, from the TSM client machine. This will disable all non root users from running the TSM Client.
Get Notified about Future Security Bulletins
References
Acknowledgement
This vulnerability was reported by Matthias Kaiser from Daimler TSS GmbH
Change History
30 Jan 2015: Original text published
18 Feb 2015: Link to 6.2 fixes published
24 Feb 2015: CVSS Temporal Score xforce link corrected
26 Feb 2015: 6.1, 5.5, and 5.5 First Fixing VRMF Level added, links to TSM for Space Management packages with fixed Backup-Archive client added, Workaround updated.
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
Document Information
Modified date:
17 June 2018
UID
swg21695878