-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.1015
    IBM Security Bulletin: Incorrect permissions on restored files and
       directories using IBM Spectrum Protect Backup-Archive Client
               web user interface on Windows (CVE-2019-4093)
                               27 March 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Spectrum Protect
Publisher:         IBM
Operating System:  Windows
Impact/Access:     Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-4093  

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=ibm10875518

- --------------------------BEGIN INCLUDED TEXT--------------------

Incorrect permissions on restored files and directories using IBM Spectrum
Protect Backup-Archive Client web user interface on Windows (CVE-2019-4093)

Product:             IBM Spectrum Protect

Component:           Backup-Archive Client web user interface

Software version:    8.1.7

Operating system(s): Windows

Reference #:         0875518

Security Bulletin

Summary

Files and directories restored using the IBM Spectrum Protect (formerly Tivoli
Storage Manager) Backup-Archive Client web user interface on Windows may have
incorrect permissions.

Vulnerability Details

CVEID: CVE-2019-4093
DESCRIPTION: IBM Tivoli Storage Manager could allow a user to restore files and
directories using IBM Spectrum Prootect Client Web User Interface on Windows
that they should not have access to due to incorrect file permissions.
CVSS Base Score: 5.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
157981 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

Affected Products and Versions

IBM Spectrum Protect (formerly Tivoli Storage Manager) Backup-Archive Client
web user interface version 8.1.7 on Windows.

Remediation/Fixes

+-----------------------------------+-------------+---------+--------+-------------------------------------------------------------+
|Spectrum Protect Backup-Archive    |First Fixing |Platform |APAR    |Link to Fix                                                  |
|Client Release                     |VRM Level    |         |        |                                                             |
+-----------------------------------+-------------+---------+--------+-------------------------------------------------------------+
|8.1.7                              |8.1.7.1      |Windows  |IT28315 |http://www.ibm.com/support/docview.wssuid=swg24043653       |
+-----------------------------------+-------------+---------+--------+-------------------------------------------------------------+

Workarounds and Mitigations

None.

Related Information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

14 March 2019 - original version published

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=nbIV
-----END PGP SIGNATURE-----