spectrum_protect_for_virtual_environments 漏洞

admin 2023-12-02 06:04:03 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
spectrum_protect_for_virtual_environments 漏洞

CVE编号

CVE-2018-1447

利用情况

暂无

补丁情况

N/A

披露时间

2018-04-05
漏洞描述
The GSKit (IBM Spectrum Protect 7.1 and 7.2) and (IBM Spectrum Protect Snapshot 4.1.3, 4.1.4, and 4.1.6) CMS KDB logic fails to salt the hash function resulting in weaker than expected protection of passwords. A weak password may be recovered. Note: After update the customer should change password to ensure the new password is stored more securely. Products should encourage customers to take this step as a high priority action. IBM X-Force ID: 139972.
解决建议
目前厂商已更新补丁,请相关用户及时下载补丁更新:http://www-01.ibm.com/support/docview.wss?uid=swg21984819
参考链接
http://www.ibm.com/support/docview.wss?uid=swg22014669
http://www.ibm.com/support/docview.wss?uid=swg22014957
http://www.ibm.com/support/docview.wss?uid=swg22015066
http://www.ibm.com/support/docview.wss?uid=swg22015071
http://www.securityfocus.com/bid/104511
http://www.securitytracker.com/id/1041012
https://exchange.xforce.ibmcloud.com/vulnerabilities/139972
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 ibm spectrum_protect_for_space_management * From (including) 7.1.0.0 Up to (including) 7.1.8.1
运行在以下环境
应用 ibm spectrum_protect_for_space_management * From (including) 8.1.0.0 Up to (including) 8.1.4.0
运行在以下环境
应用 ibm spectrum_protect_for_virtual_environments * From (including) 7.1.0.0 Up to (including) 7.1.8.0
运行在以下环境
应用 ibm spectrum_protect_for_virtual_environments * From (including) 8.1.0.0 Up to (including) 8.1.4.0
运行在以下环境
应用 ibm spectrum_protect_snapshot * From (including) 4.1.0.0 Up to (including) 4.1.6.3
运行在以下环境
系统 centos_8 tcpdump * Up to (excluding) 4.9.3-1.el8
运行在以下环境
系统 fedora_29 tcpdump-debuginfo * Up to (excluding) 4.9.3-1.fc29
运行在以下环境
系统 fedora_30 tcpdump-debuginfo * Up to (excluding) 4.9.3-1.fc30
运行在以下环境
系统 fedora_31 tcpdump-debuginfo * Up to (excluding) 4.9.3-1.fc31
运行在以下环境
系统 opensuse_Leap_15.0 tcpdump * Up to (excluding) 4.9.2-lp150.10.1
运行在以下环境
系统 opensuse_Leap_15.1 tcpdump * Up to (excluding) 4.9.2-lp151.4.6.1
运行在以下环境
系统 oracle_8 oraclelinux-release * Up to (excluding) 4.9.3-1.el8
运行在以下环境
系统 redhat_8 tcpdump * Up to (excluding) 4.9.3-1.el8
运行在以下环境
系统 suse_12 tcpdump * Up to (excluding) 4.9.2-14.14
运行在以下环境
系统 suse_12_SP5 tcpdump * Up to (excluding) 4.9.2-14.17.1
运行在以下环境
系统 ubuntu_16.04.7_lts tcpdump * Up to (excluding) 4.9.3-0ubuntu0.16.04.1
运行在以下环境
系统 ubuntu_18.04.5_lts tcpdump * Up to (excluding) 4.9.3-0ubuntu0.18.04.1
CVSS3评分 8.1
  • 攻击路径 网络
  • 攻击复杂度 高
  • 权限要求 无
  • 影响范围 未更改
  • 用户交互 无
  • 可用性 高
  • 保密性 高
  • 完整性 高
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-ID 漏洞类型
CWE-916 使用具有不充分计算复杂性的口令哈希
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0