First published: Thu Oct 17 2013(Updated: )
IBM Storwize V7000 Unified 1.3.x and 1.4.x before 1.4.2.0 does not properly handle device files that are created with the NFS protocol but accessed with a non-NFS protocol, which allows remote authenticated users to obtain sensitive information, modify programs or files, or cause a denial of service (device crash) via a (1) CIFS, (2) HTTPS, (3) SCP, or (4) SFTP operation.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Storwize Unified V7000 Software | =1.3.0.0 | |
IBM Storwize Unified V7000 Software | =1.3.2.0 | |
IBM Storwize Unified V7000 Software | =1.3.2.3 | |
IBM Storwize Unified V7000 Software | =1.4.0.0 | |
IBM Storwize Unified V7000 Software | =1.4.0.4 | |
IBM Storwize Unified V7000 Software | =1.4.1.0 | |
IBM Storwize Unified V7000 Software | =1.4.1.1 | |
IBM Storwize Unified V7000 Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0500 is classified as a moderate severity vulnerability that can lead to unauthorized access, data modification, or denial of service.
To mitigate CVE-2013-0500, upgrade to IBM Storwize V7000 Unified version 1.4.2.0 or later, where the vulnerability has been addressed.
CVE-2013-0500 affects IBM Storwize V7000 Unified software versions 1.3.x and 1.4.x before 1.4.2.0.
CVE-2013-0500 can facilitate attacks that allow remote authenticated users to access sensitive information or execute denial of service attacks.
No, CVE-2013-0500 requires authenticated users to exploit the vulnerability, which limits the scope of potential attackers.