-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.0986
Multiple vulnerabilities have been identified in IBM Tivoli Storage Manager
                               16 June 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Tivoli Storage Manager
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   Linux variants
                   Solaris
                   Windows
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-0963 CVE-2013-6747 

Reference:         ESB-2014.0886
                   ESB-2014.0880
                   ESB-2014.0878
                   ESB-2014.0201
                   ESB-2014.0113

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21674824
   http://www-01.ibm.com/support/docview.wss?uid=swg21674825

Comment: This bulletin contains two (2) IBM security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Tivoli Storage Manager Server Certificate Chaining
Vulnerability (CVE-2013-6747 )

Document information

More support for:
Tivoli Storage Manager
Server

Software version:
5.5, 6.1, 6.2, 6.3, 6.4, 7.1

Operating system(s):
AIX, HP-UX, Linux, Solaris, Windows

Software edition:
All Editions

Reference #:
1674824

Modified date:
2014-06-09

Security Bulletin

Summary

A certificate chain presented by a Client or Server could contain a circular
reference that will cause the chain building logic to loop, crash or hang.

Vulnerability Details

CVE ID: CVE-2013-6747

DESCRIPTION:
A certificate chain presented by a Client or Server could contain a circular
reference that will cause the chain building logic to loop which can lead
to a segv crash or hang due to memory exhaustion.

CVSS Base Score: 7.1

CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/89863 for the
current score

CVSS Environmental Score*: Undefined

CVSS Vector:(AV/N:AC/M:Au/N:C/N:I/N:A/C)

Affected Products and Versions

IBM Tivoli Storage Manager server release levels:

7.1.0 (all servers and storage agents)

6.3.0 through 6.3.4.30 (all servers)

6.3.3 through 6.3.4.30 (all storage agents)

6.2.0 through 6.2.6.0 (all servers)

6.1.0 through 6.1.5.xxx (AIX and Windows servers only)

5.5.0 through 5.5.7.xxx (AIX and Windows servers only)

Remediation/Fixes

The recommended solution is to apply the fixes as soon as practical. Please
see below for information on the fixes available and the links where the
fixes can be downloaded.

Product					APAR		Remediation/First Fix
IBM Tivoli Storage Manager Server 7.1	IT02298		Please call IBM service, referencing APAR IT02298.
							IBM Service will provide GSKIT installation
							files and install instructions to install GSKIT
							8.0.14.43 ( or higher ).
							A fix will also be provided as part of level 
							7.1.1.

IBM Tivoli Storage Manager Server 6.3	IT02298		Please call IBM service, referencing APAR IT02298.
							IBM Service will provide GSKIT installation files 
							and install instructions to install GSKIT 
							8.0.14.43 ( or higher ).
							A fix will also be provided as part of level 6.3.5.

IBM Tivoli Storage Manager Server 6.2	IT02298		Please call IBM service, referencing APAR IT02298.
							IBM Service will provide GSKIT installation files 
							and install instructions to install GSKIT 7.0.4.50 
							( or higher ).
							A fix will also be provided as part of level 6.2.7.
IBM Tivoli Storage Manager Server 6.1 			Please note that IBM has previously announced End 
and 5.5, on AIX and Windows only			of Support for these versions, effective April 30,
							2014. IBM recommends using the Workaround 
							specified below, or upgrading to a fixed, 
							supported release

Workarounds and Mitigations

Remove the ability for users to use SSL sessions by changing the server
and/or storage agent option files to remove the SSL communication options

References
Complete CVSS Guide
On-line Calculator V2

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowledgement

None

Change History

<09 June 2014>: Original Copy Published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Cross reference information

Segment			Product				Platform				Version			Edition
Storage Management	Tivoli Storage Manager 		AIX, HP-UX, Linux, Solaris, Windows	6.2, 6.1, 5.5, 6.3, 7.1
			for Storage Area Networks
	
Storage Management	IBM System Storage Archive 	AIX, HP-UX, Linux, Solaris, Windows	6.2, 6.1.2, 6.3, 6.4, 	All Editions
			Manager									7.1

Storage Management	Tivoli Storage Manager 		AIX, HP-UX, Linux, Solaris, Windows	6.3, 6.4, 7.1
			Extended Edition

- -------------------------------------------------------------------------------
Security Bulletin: TSM Server CPU Utilization (CVE-2014-0963)

Security Bulletin

Document information

More support for:
Tivoli Storage Manager
Server

Software version:
5.5, 6.1, 6.2, 6.3, 6.4, 7.1

Operating system(s):
AIX, HP-UX, Linux, Solaris, Windows

Software edition:
All Editions

Reference #:
1674825

Modified date:
2014-06-11

Summary

The IBM Tivoli Storage Manager (TSM) server and storage agent are affected
by a problem related to the SSL implementation which, under very specific
conditions, can cause CPU utilization to rapidly increase.

Vulnerability Details

CVE ID: CVE-2014-0963

DESCRIPTION:
TSM server and storage agent are affected by a problem with the handling
of certain SSL messages. The TLS implementation can, under very specific
conditions, cause CPU utilization to rapidly increase. The situation occurs
only in a certain error case that causes a single thread to begin looping. If
this happens multiple times, more threads will begin to loop and an increase
in CPU utilization will be seen. This increase could ultimately result in
CPU exhaustion and unresponsiveness of the Tivoli Storage Manager server
and/or storage agent and other software running on the affected system.

This issue can affect the availability of the system, but does not impact
system confidentiality or integrity. This vulnerability can be remotely
exploited, authentication is not required and the exploit is moderately
complex.

To determine if your systems are being affected by this issue, you can
monitor the CPU utilization for Tivoli Storage Manager instances.

CVSS Base Score: 7.1
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/92844 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:C)

Affected Products and Versions

IBM Tivoli Storage Manager server release levels:

7.1.0 (all servers and storage agents)

6.3.0 through 6.3.4.30 (all servers)

6.3.3 through 6.3.4.30 (all storage agents)

6.2.0 through 6.2.6.0 (all servers)

6.1.0 through 6.1.5.xxx (AIX and Windows servers only)

5.5.0 through 5.5.7.xxx (AIX and Windows servers only)

Remediation/Fixes

IBM has provided patches for all affected versions. Follow the installation
instructions included with the patch.

Product					APAR		Remediation/First Fix
IBM Tivoli Storage Manager Server 7.1	IT02298		Please call IBM service, referencing APAR IT02298.
							IBM Service will provide GSKIT installation files and install instructions
							to install GSKIT 8.0.14.43 ( or higher ).
							A fix will also be provided as part of level 7.1.1.

IBM Tivoli Storage Manager Server 6.3	IT02298		Please call IBM service, referencing APAR IT02298.
							IBM Service will provide GSKIT installation files and install instructions
							to install GSKIT 8.0.14.43 ( or higher ).
							A fix will also be provided as part of level 6.3.5.

IBM Tivoli Storage Manager Server 6.2	IT02298		Please call IBM service, referencing APAR IT02298.
							IBM Service will provide GSKIT installation files and install instructions
							to install GSKIT 7.0.4.50 ( or higher ).
							A fix will also be provided as part of level 6.2.7.

IBM Tivoli Storage Manager Server 6.1 			Please note that IBM has previously announced End of Support for these
and 5.5, on AIX and Windows only			versions, effective April 30, 2014.
							IBM recommends using the Workaround specified below, or upgrading to a
							fixed, supported release

Workarounds and Mitigations

Method One) Monitor CPU utilization of your Tivoli Storage Manager server
and/or storage agent instances. If utilization becomes abnormally high,
stop and restart the affected instance.

Method Two) Disable the use of TLS in Tivoli Storage Manager. To do this,
perform the following for every Server or Storage agent instance in your
environment:

1. For every server, update the options file
( server - dsmserv.opt or storage agent - dsmsta.opt ), by commenting out
the options
statement "SSLTCPPORT xxxx" and "SSLTCPADMINPORT xxxx".
Commenting out entails placing an asterisk at the beginning of the line
containing "SLTCPPORT" and/or "SSLTCPADMINPORT".
2. Ensure that a TCPPORT or TCPADMINPORT options statement is in the
options file and
not commented out.
3. Update all server and storage agent definitions to use the TCP port
rather than the SSL port
in each server and storage agent. For storage agents, you can re-define
the setup by using
the dsmsta setstorageserver command and not using the SSL=YES parameter.
4. Update all client options files by commenting out the "SSL YES" option
in their respective
dsm.sys files and/or options files. Note: A new level of the client is
notrequired for this issue.
5. Stop and re-start all storage agents and servers. Then, stop and start
all clients and client
schedulers that are using SSL as their communication methods.

References
Complete CVSS Guide
On-line Calculator V2

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowledgement

None
Change History

<09 June 2014>: Original Copy Published
<11 June 2014>: Indicated that new client is not necessary in Workarounds

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Cross reference information 

Segment			Product					Platform			Version			Edition
Storage Management	IBM System Storage Archive Manager	AIX,HP-UX, Linux, Solaris, 	6.2, 6.1.2, 6.3, 
								Windows				6.4, 7.1

Storage Management	Tivoli Storage Manager for Storage Area AIX, HP-UX, Linux, Solaris, 	6.3, 7.1		All Editions
			Networks				Windows	

Storage Management	Tivoli Storage Manager Extended Edition AIX, HP-UX, Linux, Solaris,   	5.5, 6.1, 6.1.2, 	All Editions
								Windows   			6.2, 6.3, 6.4, 7.1

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=8nqf
-----END PGP SIGNATURE-----