IBM Tivoli Storage FlashCopy Manager for VMware 3.1.x < 3.1.1.3 / 3.2.x < 3.2.0.6 / 4.1.x < 4.1.4.0 Command Execution

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

A backup application installed on the remote host is affected by
multiple remote command execution vulnerabilities.

Description :

The version of IBM Tivoli Storage FlashCopy Manager for VMware
installed on the remote host is affected by multiple vulnerabilities :

- An unspecified flaw exists in the graphical user interface
that allows an unauthenticated, remote attacker to perform
backup and restore operations, along with other
administrative commands, resulting in a possible adverse
impact on the integrity of system operation or the
disclosure of confidential information. (CVE-2015-7425)

- A flaw exists in the IBM Data Protection Extension that
can result in privilege escalation. An authenticated
attacker can exploit this to select an existing virtual
machine from the vSphere inventory and perform a Restore
operation without having the required privilege for the
operation. Although performing this operation does not
overwrite the existing virtual machine, the attacker can
create a new virtual machine holding the same data,
allowing disclosure of information. (CVE-2015-7429)

See also :

http://www-01.ibm.com/support/docview.wss?uid=swg21973086
http://www-01.ibm.com/support/docview.wss?uid=swg21973087

Solution :

Upgrade to Tivoli Storage FlashCopy Manager for VMware version
3.1.1.3 / 3.2.0.6 / 4.1.4.0 or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 87822 ()

Bugtraq ID: 79541
79545

CVE ID: CVE-2015-7425
CVE-2015-7429

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now