spectrum_protect_for_virtual_environments 漏洞
CVE编号
CVE-2018-1447利用情况
暂无补丁情况
N/A披露时间
2018-04-05漏洞描述
The GSKit (IBM Spectrum Protect 7.1 and 7.2) and (IBM Spectrum Protect Snapshot 4.1.3, 4.1.4, and 4.1.6) CMS KDB logic fails to salt the hash function resulting in weaker than expected protection of passwords. A weak password may be recovered. Note: After update the customer should change password to ensure the new password is stored more securely. Products should encourage customers to take this step as a high priority action. IBM X-Force ID: 139972.解决建议
目前厂商已更新补丁,请相关用户及时下载补丁更新:http://www-01.ibm.com/support/docview.wss?uid=swg21984819受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | ibm | spectrum_protect_for_space_management | * | From (including) 7.1.0.0 | Up to (including) 7.1.8.1 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_protect_for_space_management | * | From (including) 8.1.0.0 | Up to (including) 8.1.4.0 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_protect_for_virtual_environments | * | From (including) 7.1.0.0 | Up to (including) 7.1.8.0 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_protect_for_virtual_environments | * | From (including) 8.1.0.0 | Up to (including) 8.1.4.0 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_protect_snapshot | * | From (including) 4.1.0.0 | Up to (including) 4.1.6.3 | ||||
运行在以下环境 | |||||||||
系统 | centos_8 | tcpdump | * | Up to (excluding) 4.9.3-1.el8 | |||||
运行在以下环境 | |||||||||
系统 | fedora_29 | tcpdump-debuginfo | * | Up to (excluding) 4.9.3-1.fc29 | |||||
运行在以下环境 | |||||||||
系统 | fedora_30 | tcpdump-debuginfo | * | Up to (excluding) 4.9.3-1.fc30 | |||||
运行在以下环境 | |||||||||
系统 | fedora_31 | tcpdump-debuginfo | * | Up to (excluding) 4.9.3-1.fc31 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | tcpdump | * | Up to (excluding) 4.9.2-lp150.10.1 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.1 | tcpdump | * | Up to (excluding) 4.9.2-lp151.4.6.1 | |||||
运行在以下环境 | |||||||||
系统 | oracle_8 | oraclelinux-release | * | Up to (excluding) 4.9.3-1.el8 | |||||
运行在以下环境 | |||||||||
系统 | redhat_8 | tcpdump | * | Up to (excluding) 4.9.3-1.el8 | |||||
运行在以下环境 | |||||||||
系统 | suse_12 | tcpdump | * | Up to (excluding) 4.9.2-14.14 | |||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | tcpdump | * | Up to (excluding) 4.9.2-14.17.1 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04.7_lts | tcpdump | * | Up to (excluding) 4.9.3-0ubuntu0.16.04.1 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04.5_lts | tcpdump | * | Up to (excluding) 4.9.3-0ubuntu0.18.04.1 | |||||
- 攻击路径 网络
- 攻击复杂度 高
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 高
- 完整性 高
CWE-ID | 漏洞类型 |
CWE-916 | 使用具有不充分计算复杂性的口令哈希 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论