First published: Wed Feb 01 2017(Updated: )
Tivoli Storage Manager Operations Center could allow a local user to take over a previously logged in user due to session expiration not being enforced.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tivoli Storage Manager | =6.4.1 | |
IBM Tivoli Storage Manager | =6.4.1.1 | |
IBM Tivoli Storage Manager | =6.4.2 | |
IBM Tivoli Storage Manager | =6.4.2.1 | |
IBM Tivoli Storage Manager | =6.4.2.2 | |
IBM Tivoli Storage Manager | =6.4.2.3 | |
IBM Tivoli Storage Manager | =6.4.2.4 | |
IBM Tivoli Storage Manager | =7.1 | |
IBM Tivoli Storage Manager | =7.1.0.1 | |
IBM Tivoli Storage Manager | =7.1.0.2 | |
IBM Tivoli Storage Manager | =7.1.1.1 | |
IBM Tivoli Storage Manager | =7.1.1.2 | |
IBM Tivoli Storage Manager | =7.1.3 | |
IBM Tivoli Storage Manager | =7.1.3.1 | |
IBM Tivoli Storage Manager | =7.1.3.2 | |
IBM Tivoli Storage Manager | =7.1.4 | |
IBM Tivoli Storage Manager | =7.1.4.1 | |
IBM Tivoli Storage Manager | =7.1.4.2 | |
IBM Tivoli Storage Manager | =7.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6043 is classified as a moderate severity vulnerability due to its potential for local user exploitation.
To fix CVE-2016-6043, ensure that you update to the latest version of IBM Tivoli Storage Manager that addresses session expiration issues.
CVE-2016-6043 affects multiple versions, including 6.4.1, 6.4.2, and several 7.1.x versions of IBM Tivoli Storage Manager.
CVE-2016-6043 cannot be exploited remotely as it requires local user access to exploit the session expiration issue.
CVE-2016-6043 allows a local user to take over another user's session if it is not properly secured due to session expiration not being enforced.