Lucene search

K
ibmIBM6583546A7A89E38BD54753232C1261614908CAB219566A0AB9D60A4B2A84FC01
HistorySep 25, 2022 - 8:45 p.m.

Security Bulletin: TSM Client Scheduler Denial Of Service Vulnerability (CVE-2013-0471)

2022-09-2520:45:36
www.ibm.com
11
ibm tivoli storage manager
denial of service
remote attacker
scheduled backups

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

EPSS

0.006

Percentile

78.9%

Abstract

A Denial of Service vulnerability exists in the IBM Tivoli Storage Manager (TSM) client traditional scheduler

Content

**DESCRIPTION:**A Denial of Service vulnerability in the TSM client traditional scheduler allows a remote attacker to disable the traditional scheduler when it is in Prompted mode (SCHEDMODE=PROMPTED). Once disabled, no more schedules (such as scheduled backups) will be run, and the TSM server log will show that schedules for that node are missed.

**CVEID:*CVE-2013-0471
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/81215
for the current score
CVSS Environmental Score
: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)

AFFECTED PRODUCTS AND VERSIONS:

  • TSM Client 6.4.0.0
  • TSM Client 6.3.0.x
  • TSM Client 6.2.0.0 through 6.2.4.x
  • TSM Client 6.1.0.0 through 6.1.5.x
  • TSM Client 5.5.0.0 through 5.5.4.x
  • all previous releases, which are unsupported

REMEDIATION:

TSM Release First Fixing VRMF Level Client Platform APAR Link to fix
6.4 6.4.0.1 All IC87331 http://www.ibm.com/support/docview.wss?uid=swg24034276
6.3 6.3.1.0 All IC87331 _<http://www.ibm.com/support/docview.wss?uid=swg24034109&gt;_
6.2 6.2.5.0 All IC87331 <http://www.ibm.com/support/docview.wss?uid=swg24034630&gt;
6.1 None
Upgrade to fixing 6.3 or 6.4 client, or use workarounds
5.5 None
Upgrade to fixing 6.3 or 6.4 client, or use workarounds
5.4 and previous None
No longer in support
Upgrade to fixing 6.3 or 6.4 client, or use workarounds

Workaround(s):
One of the following:

  • If using the traditional scheduler, set the SCHEDMODE option value to POLLING, which is the default value, in the client options file or on the command line
  • Configure the scheduler to be managed by Client Acceptor Daemon (CAD), by specifying โ€˜MANAGEDSERVICES SCHEDULEโ€™ or โ€˜MANAGEDSERVICES SCHEDULE WEBCLIENTโ€™ in the client options file

Mitigation(s):
See Workarounds above.

REFERENCES:
ยท Complete CVSS Guide
ยท On-line Calculator V2_ _
ยท CVE-2013-0471__ __
ยท _X-Force Vulnerability Database __<https://exchange.xforce.ibmcloud.com/vulnerabilities/81215&gt;_

RELATED INFORMATION:
_IBM Secure Engineering Web Portal _
IBM Product Security Incident Response Blog

ACKNOWLEDGEMENT
None

CHANGE HISTORY
31 January 2013: Original Copy Published
8 February 2013: Added โ€˜One of the following:โ€™ to the beginning of the Workaround section, to clarify that either bulleted item is a workaround.
6 June 2013: Added hyperlink to 6.2.5 download
18 August 2015: Fixed link to CVSS doc

_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _

_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an โ€œindustry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.โ€ IBM PROVIDES THE CVSS SCORES โ€œAS ISโ€ WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY

[{โ€œProductโ€:{โ€œcodeโ€:โ€œSSGSG7โ€,โ€œlabelโ€:โ€œTivoli Storage Managerโ€},โ€œBusiness Unitโ€:{โ€œcodeโ€:โ€œBU058โ€,โ€œlabelโ€:โ€œIBM Infrastructure w/TPSโ€},โ€œComponentโ€:โ€œClientโ€,โ€œPlatformโ€:[{โ€œcodeโ€:โ€œPF025โ€,โ€œlabelโ€:โ€œPlatform Independentโ€}],โ€œVersionโ€:โ€œ5.5;6.1;6.2;6.3;6.4โ€,โ€œEditionโ€:โ€œโ€,โ€œLine of Businessโ€:{โ€œcodeโ€:โ€œLOB26โ€,โ€œlabelโ€:โ€œStorageโ€}},{โ€œProductโ€:{โ€œcodeโ€:โ€œSSSR2Rโ€,โ€œlabelโ€:โ€œTivoli Storage Manager for Space Managementโ€},โ€œBusiness Unitโ€:{โ€œcodeโ€:โ€œBU058โ€,โ€œlabelโ€:โ€œIBM Infrastructure w/TPSโ€},โ€œComponentโ€:" โ€œ,โ€œPlatformโ€:[{โ€œcodeโ€:โ€œPF002โ€,โ€œlabelโ€:โ€œAIXโ€},{โ€œcodeโ€:โ€œPF016โ€,โ€œlabelโ€:โ€œLinuxโ€}],โ€œVersionโ€:โ€œ5.5;6.1;6.2;6.3;6.4โ€,โ€œEditionโ€:โ€โ€œ,โ€œLine of Businessโ€:{โ€œcodeโ€:โ€œLOB26โ€,โ€œlabelโ€:โ€œStorageโ€}},{โ€œProductโ€:{โ€œcodeโ€:โ€œSSSQWCโ€,โ€œlabelโ€:โ€œTivoli Storage Manager Extended Editionโ€},โ€œBusiness Unitโ€:{โ€œcodeโ€:โ€œBU058โ€,โ€œlabelโ€:โ€œIBM Infrastructure w/TPSโ€},โ€œComponentโ€:โ€œClientโ€,โ€œPlatformโ€:[{โ€œcodeโ€:โ€œPF002โ€,โ€œlabelโ€:โ€œAIXโ€},{โ€œcodeโ€:โ€œPF010โ€,โ€œlabelโ€:โ€œHP-UXโ€},{โ€œcodeโ€:โ€œPF016โ€,โ€œlabelโ€:โ€œLinuxโ€},{โ€œcodeโ€:โ€œPF027โ€,โ€œlabelโ€:โ€œSolarisโ€},{โ€œcodeโ€:โ€œPF033โ€,โ€œlabelโ€:โ€œWindowsโ€},{โ€œcodeโ€:โ€œPF017โ€,โ€œlabelโ€:โ€œMac OSโ€}],โ€œVersionโ€:โ€œ6.2;5.5;6.1;6.3;6.4โ€,โ€œEditionโ€:โ€โ€œ,โ€œLine of Businessโ€:{โ€œcodeโ€:โ€œLOB26โ€,โ€œlabelโ€:โ€œStorageโ€}},{โ€œProductโ€:{โ€œcodeโ€:โ€œSSAT9Sโ€,โ€œlabelโ€:โ€œIBM System Storage Archive Managerโ€},โ€œBusiness Unitโ€:{โ€œcodeโ€:โ€œBU058โ€,โ€œlabelโ€:โ€œIBM Infrastructure w/TPSโ€},โ€œComponentโ€:โ€ โ€œ,โ€œPlatformโ€:[{โ€œcodeโ€:โ€œPF002โ€,โ€œlabelโ€:โ€œAIXโ€},{โ€œcodeโ€:โ€œPF010โ€,โ€œlabelโ€:โ€œHP-UXโ€},{โ€œcodeโ€:โ€œPF016โ€,โ€œlabelโ€:โ€œLinuxโ€},{โ€œcodeโ€:โ€œPF027โ€,โ€œlabelโ€:โ€œSolarisโ€},{โ€œcodeโ€:โ€œPF033โ€,โ€œlabelโ€:โ€œWindowsโ€},{โ€œcodeโ€:โ€œPF017โ€,โ€œlabelโ€:โ€œMac OSโ€}],โ€œVersionโ€:โ€โ€œ,โ€œEditionโ€:โ€",โ€œLine of Businessโ€:{โ€œcodeโ€:โ€œLOB26โ€,โ€œlabelโ€:โ€œStorageโ€}}]

Affected configurations

Vulners
Node
ibmtivoli_storage_managerMatch5.5
OR
ibmtivoli_storage_managerMatch6.1
OR
ibmtivoli_storage_managerMatch6.2
OR
ibmtivoli_storage_managerMatch6.3
OR
ibmtivoli_storage_managerMatch6.4
OR
ibmtivoli_storage_manager_for_space_managementMatch5.5
OR
ibmtivoli_storage_manager_for_space_managementMatch6.1
OR
ibmtivoli_storage_manager_for_space_managementMatch6.2
OR
ibmtivoli_storage_manager_for_space_managementMatch6.3
OR
ibmtivoli_storage_manager_for_space_managementMatch6.4
OR
ibmtivoli_storage_managerMatch6.2
OR
ibmtivoli_storage_managerMatch5.5
OR
ibmtivoli_storage_managerMatch6.1
OR
ibmtivoli_storage_managerMatch6.3
OR
ibmtivoli_storage_managerMatch6.4
OR
ibmsystem_storage_ds3524Matchany
VendorProductVersionCPE
ibmtivoli_storage_manager5.5cpe:2.3:a:ibm:tivoli_storage_manager:5.5:*:*:*:*:*:*:*
ibmtivoli_storage_manager6.1cpe:2.3:a:ibm:tivoli_storage_manager:6.1:*:*:*:*:*:*:*
ibmtivoli_storage_manager6.2cpe:2.3:a:ibm:tivoli_storage_manager:6.2:*:*:*:*:*:*:*
ibmtivoli_storage_manager6.3cpe:2.3:a:ibm:tivoli_storage_manager:6.3:*:*:*:*:*:*:*
ibmtivoli_storage_manager6.4cpe:2.3:a:ibm:tivoli_storage_manager:6.4:*:*:*:*:*:*:*
ibmtivoli_storage_manager_for_space_management5.5cpe:2.3:a:ibm:tivoli_storage_manager_for_space_management:5.5:*:*:*:*:*:*:*
ibmtivoli_storage_manager_for_space_management6.1cpe:2.3:a:ibm:tivoli_storage_manager_for_space_management:6.1:*:*:*:*:*:*:*
ibmtivoli_storage_manager_for_space_management6.2cpe:2.3:a:ibm:tivoli_storage_manager_for_space_management:6.2:*:*:*:*:*:*:*
ibmtivoli_storage_manager_for_space_management6.3cpe:2.3:a:ibm:tivoli_storage_manager_for_space_management:6.3:*:*:*:*:*:*:*
ibmtivoli_storage_manager_for_space_management6.4cpe:2.3:a:ibm:tivoli_storage_manager_for_space_management:6.4:*:*:*:*:*:*:*
Rows per page:
1-10 of 111

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

EPSS

0.006

Percentile

78.9%

Related for 6583546A7A89E38BD54753232C1261614908CAB219566A0AB9D60A4B2A84FC01