A vulnerability in IBM Tivoli Composite Application Manager for Transactions on Linux, Solaris and AIX could allow a local user to gain elevated privilege.
CVE-ID:CVE-2014-0907
**DESCRIPTION:**The IBM Tivoli Composite Application Manager for Transactions products listed below contain a security vulnerability which allows a malicious user to gain root privilege. This vulnerability can only be exploited by users through a local system account login.
CVSS Base Score: 6.9
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/91869> for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:L/AC:M/Au:N/C:C/I:C/A:C)
IBM Tivoli Composite Application Manager (ITCAM) for Transactions is affected. ITCAM for Transactions contains multiple sub components (Agents). Only the Internet Service Monitor (ISM โ Agent code โISโ) on AIX, Solaris and Linux is affected. Windows is not affected.
Versions:
ยท 7.4
ยท 7.3
ยท 7.2
ยท 7.1
Product
| VRMF| APAR| Remediation/First Fix
โ|โ|โ|โ
7.4.0.0-TIV-CAMIS-IF0013| 7.4.0.0| None| http://www.ibm.com/support/docview.wss?uid=isg400001841
7.3.0.1-TIV-CAMIS-IF0029| 7.3.0.1| None| http://www.ibm.com/support/docview.wss?uid=isg400001843
7.2.0.3-TIV-CAMIS-IF0026| 7.2.0.3| None| http://www.ibm.com/support/docview.wss?uid=isg400001816
Will Not Fix| 7.1.0.0| None| Upgrade to 7.4.0.0-TIV-CAMIS-IF0013
It is possible for system administrators to lock down binaries paths via setting RPATH utilities (e.g. patchelf on Linux, chrpath on Solaris, db2chglibpath on AIX). This will completely negate the vulnerability.