First published: Wed Feb 01 2017(Updated: )
The Tivoli Storage Manager (TSM) password may be displayed in plain text via application trace output while application tracing is enabled.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tivoli Storage Manager | >=7.1.0.0<=7.1.6.2 | |
Apple iOS and macOS | ||
HPE HP-UX | ||
IBM AIX | ||
Linux Kernel | ||
Microsoft Windows | ||
Oracle Solaris and Zettabyte File System (ZFS) | ||
IBM Tivoli Storage Manager | >=6.4.0.0<=6.4.3.3 | |
IBM Tivoli Storage Manager | >=5.5<=6.3.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0371 is rated as moderate due to the potential exposure of sensitive information.
To mitigate CVE-2016-0371, disable application tracing or upgrade to a version of IBM Tivoli Storage Manager that addresses this vulnerability.
CVE-2016-0371 affects IBM Tivoli Storage Manager versions between 5.5 and 7.1.6.2.
CVE-2016-0371 can expose user passwords in plain text through application trace output.
No, CVE-2016-0371 specifically affects IBM Tivoli Storage Manager and does not impact other systems.