IBM Tivoli Storage Manager for Space Management (aka Spectrum Protect for Space Management) 6.3.x before 6.3.2.6, 6.4.x before 6.4.3.3, and 7.1.x before 7.1.6, when certain dsmsetpw tracing is configured, allows local users to discover an encrypted password by reading application-trace output.
References
Link | Resource |
---|---|
http://www-01.ibm.com/support/docview.wss?uid=swg1IT15203 | Vendor Advisory |
http://www-01.ibm.com/support/docview.wss?uid=swg21989006 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/92723 | |
http://www-01.ibm.com/support/docview.wss?uid=swg1IT15203 | Vendor Advisory |
http://www-01.ibm.com/support/docview.wss?uid=swg21989006 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/92723 |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://www-01.ibm.com/support/docview.wss?uid=swg1IT15203 - Vendor Advisory | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg21989006 - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/92723 - |
Information
Published : 2016-09-12 10:59
Updated : 2024-11-21 02:55
NVD link : CVE-2016-5927
Mitre link : CVE-2016-5927
CVE.ORG link : CVE-2016-5927
JSON object : View
Products Affected
ibm
- tivoli_storage_manager_for_space_management
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor