多款IBM产品文件访问漏洞(CNVD-2018-13180)
CVE编号
CVE-2018-1462利用情况
暂无补丁情况
N/A披露时间
2018-05-18漏洞描述
IBM SAN Volume Controller(SVC)采用 IBM Spectrum Storage软件进行构建,是一种可靠的系统,有助于提高新的和现有存储基础架构的数据价值、安全性和易用性。IBM Storwize产品家族提供了具备常见功能以及管理和移动能力的全闪存及混合存储解决方案。IBM Spectrum Virtualize是一款纯软件的存储产品,支持软件定义存储管理和保护海量数据。IBM FlashSystem产品是将数据存储在闪存上的企业计算机数据存储系统。 IBM SAN Volume Controller、IBM Storwize、IBM Spectrum Virtualize及IBM FlashSystem产品存在文件访问漏洞。攻击者可利用该漏洞访问其无权访问的系统文件,从而可删除文件或导致拒绝服务。解决建议
厂商已发布漏洞修复程序,请及时关注更新:http://www-01.ibm.com/support/docview.wss?uid=ssg1S1012263http://www-01.ibm.com/support/docview.wss?uid=ssg1S1012282http://www-01.ibm.com/support/docview.wss?uid=ssg1S1012283受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize | * | From (including) 6.1.0.0 | Up to (excluding) 7.5.0.14 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize | * | From (including) 7.7.0.0 | Up to (excluding) 7.7.1.9 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize | * | From (including) 7.8.0.0 | Up to (excluding) 7.8.1.6 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize | * | From (including) 8.1.1.0 | Up to (excluding) 8.1.1.2 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize | * | From (including) 8.1.2.0 | Up to (excluding) 8.1.2.1 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize_for_public_cloud | * | From (including) 6.1.0.0 | Up to (excluding) 7.5.0.14 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize_for_public_cloud | * | From (including) 7.7.0.0 | Up to (excluding) 7.7.1.9 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize_for_public_cloud | * | From (including) 7.8.0.0 | Up to (excluding) 7.8.1.6 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize_for_public_cloud | * | From (including) 8.1.1.0 | Up to (excluding) 8.1.1.2 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize_for_public_cloud | * | From (including) 8.1.2.0 | Up to (excluding) 8.1.2.1 | ||||
运行在以下环境 | |||||||||
系统 | amazon_2 | kernel | * | Up to (excluding) 1.3.7.5-28.amzn2.0.1 | |||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | kernel | * | Up to (excluding) 1.3.7.5-28.58.amzn1 | |||||
运行在以下环境 | |||||||||
系统 | centos_7 | kernel | * | Up to (excluding) 1.3.7.5-28.el7_5 | |||||
运行在以下环境 | |||||||||
系统 | fedora_27 | pdns-backend-tinydns | * | Up to (excluding) 4.1.5-1.fc27 | |||||
运行在以下环境 | |||||||||
系统 | fedora_28 | pdns-recursor-debuginfo | * | Up to (excluding) 4.1.5-1.fc28 | |||||
运行在以下环境 | |||||||||
系统 | fedora_29 | pdns-recursor-debuginfo | * | Up to (excluding) 4.1.5-1.fc29 | |||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_7 | pdns-recursor-debuginfo | * | Up to (excluding) 4.0.6-2.el7 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | pdns-recursor | * | Up to (excluding) 4.12.14-lp150.12.45.1 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | pdns-recursor | * | Up to (excluding) 4.0.5-9.1 | |||||
运行在以下环境 | |||||||||
系统 | oracle_7 | kernel | * | Up to (excluding) 3.10.0-1062.el7 | |||||
运行在以下环境 | |||||||||
系统 | redhat_7 | 389-ds-base | * | Up to (excluding) 3.10.0-1062.el7 | |||||
运行在以下环境 | |||||||||
系统 | suse_11 | libtirpc | * | Up to (excluding) 0.2.1-1.13.6 | |||||
运行在以下环境 | |||||||||
系统 | suse_11_SP4 | libtirpc1 | * | Up to (excluding) 0.2.1-1.13.6.1 | |||||
运行在以下环境 | |||||||||
系统 | suse_12 | kernel-default-extra | * | Up to (excluding) 4.12.14-120 | |||||
运行在以下环境 | |||||||||
系统 | suse_12_SP4 | kernel | * | Up to (excluding) 4.12.14-95.6.1 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04.6_lts | libtirpc | * | Up to (excluding) 0.2.2-5ubuntu2.1 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04.7_lts | libtirpc | * | Up to (excluding) 0.2.5-1ubuntu0.1 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04.5_lts | linux | * | Up to (excluding) 4.15.0-44.47 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.10 | linux | * | Up to (excluding) 4.18.0-14.15 | |||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 低
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 低
- 完整性 低
CWE-ID | 漏洞类型 |
CWE-863 | 授权机制不正确 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论