IBM Spectrum Protect Client Instrumentation Log Credentials Disclosure

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

A client application installed on the remote host is affected by an
information disclosure vulnerability.

Description :

The version of IBM Spectrum Protect Client installed on the remote
host is 5.5.x or 6.x prior to 6.4.3.5 or else 7.1.x prior to 7.1.6.5.
It is, therefore, affected by an information disclosure vulnerability
when using the 'set password' client command due to the full text of
the command and the included password being written to the
instrumentation log file. This issue occurs when instrumentation
tracing is enabled. A local attacker can exploit this vulnerability to
disclose credentials.

Note that for version 7.1.6.0 and higher, instrumentation tracing is
enabled by default, but it can be disabled by using the
'ENABLEINSTRUMENTATION NO' setting. Prior to 7.1.6.0, instrumentation
tracing was enabled by using the 'INSTRUMENT:*' testflag.

IBM Spectrum Protect was formerly known as IBM Tivoli Storage Manager
in releases prior to version 7.1.3.

See also :

https://www-01.ibm.com/support/docview.wss?uid=swg21998166

Solution :

Upgrade to IBM Spectrum Protect Client version 6.4.3.5 / 7.1.6.5 or
later.

Risk factor :

Low / CVSS Base Score : 1.9
(CVSS2#AV:L/AC:M/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 1.6
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 100157 ()

Bugtraq ID: 98335

CVE ID: CVE-2016-8916

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now