First published: Mon Aug 08 2016(Updated: )
IBM Sterling Connect:Direct for Unix 4.1.0 before 4.1.0.4 iFix073 and 4.2.0 before 4.2.0.4 iFix003 uses default file permissions of 0664, which allows local users to obtain sensitive information via standard filesystem operations.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Connect:Direct | =direct-4.1.0.0 | |
IBM Sterling Connect:Direct | =direct-4.1.0.1 | |
IBM Sterling Connect:Direct | =direct-4.1.0.2 | |
IBM Sterling Connect:Direct | =direct-4.1.0.3 | |
IBM Sterling Connect:Direct | =direct-4.1.0.4 | |
IBM Sterling Connect:Direct | =direct-4.2.0.0 | |
IBM Sterling Connect:Direct | =direct-4.2.0.1 | |
IBM Sterling Connect:Direct | =direct-4.2.0.2 | |
IBM Sterling Connect:Direct | =direct-4.2.0.3 | |
IBM Sterling Connect:Direct | =direct-4.2.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0380 is rated as a medium severity vulnerability due to its potential to expose sensitive information to local users.
To fix CVE-2016-0380, update IBM Sterling Connect:Direct to version 4.1.0.4 iFix073 or 4.2.0.4 iFix003 or later.
CVE-2016-0380 affects IBM Sterling Connect:Direct for Unix versions 4.1.0 to 4.1.0.3 and 4.2.0 to 4.2.0.3.
The vulnerability in CVE-2016-0380 is caused by default file permissions of 0664 allowing unauthorized local access to sensitive files.
A temporary workaround for CVE-2016-0380 is to manually change the file permissions to restrict access until a patch is applied.