First published: Mon Sep 12 2016(Updated: )
IBM Tivoli Storage Manager for Space Management (aka Spectrum Protect for Space Management) 6.3.x before 6.3.2.6, 6.4.x before 6.4.3.3, and 7.1.x before 7.1.6, when certain dsmsetpw tracing is configured, allows local users to discover an encrypted password by reading application-trace output.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tivoli Storage Manager for Space Management | =6.3.0 | |
IBM Tivoli Storage Manager for Space Management | =6.3.2 | |
IBM Tivoli Storage Manager for Space Management | =6.4.0 | |
IBM Tivoli Storage Manager for Space Management | =6.4.0.0 | |
IBM Tivoli Storage Manager for Space Management | =6.4.1 | |
IBM Tivoli Storage Manager for Space Management | =6.4.2 | |
IBM Tivoli Storage Manager for Space Management | =6.4.3 | |
IBM Tivoli Storage Manager for Space Management | =7.1.0 | |
IBM Tivoli Storage Manager for Space Management | =7.1.1 | |
IBM Tivoli Storage Manager for Space Management | =7.1.2 | |
IBM Tivoli Storage Manager for Space Management | =7.1.3 | |
IBM Tivoli Storage Manager for Space Management | =7.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5927 is rated as moderately severe due to the risk of local users uncovering encrypted passwords.
To mitigate CVE-2016-5927, upgrade to IBM Tivoli Storage Manager for Space Management version 6.3.2.6, 6.4.3.3, or 7.1.6 or later.
CVE-2016-5927 affects IBM Tivoli Storage Manager for Space Management versions 6.3.0 to 6.3.2.5, 6.4.0 to 6.4.3.2, and 7.1.0 to 7.1.5.
Yes, local users can exploit CVE-2016-5927 by reading application-trace output to uncover an encrypted password.
While upgrading is the most effective solution, limiting access to application-trace output may provide a temporary workaround for CVE-2016-5927.