Flexera InstallAnywhere untrusted DLL search path in IBM Tivoli Storage Manager Administration Center



Published: 2016-07-02 | Updated: 2016-07-29
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2016-4560
CWE-ID CWE-427
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
IBM Tivoli Storage Manager Administration Center
Server applications / File servers (FTP/HTTP)

Vendor IBM Corporation

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Flexera InstallAnywhere untrusted DLL search path

EUVDB-ID: #VU232

Risk: High

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-4560

CWE-ID: CWE-427 - Uncontrolled Search Path Element

Exploit availability: No

Description

The vulnerability allows a local userr to obtain elevated privileges on the target system.

The vulnerability exists due to an untrusted search path. A local user can gain elevated privileges on the system using a Trojan horse DLL in the current working directory of a setup-launcher executable file.

Successful exploitation of this vulnerability may result in arbitrary code execution via local system.

Mitigation

Install the latest version: 6.3.6.

Vulnerable software versions

IBM Tivoli Storage Manager Administration Center: 6.1 - 6.3.0.0

External links

http://www-01.ibm.com/support/docview.wss?uid=swg21985483


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###