Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2012-6153 CVE-2014-3577 CVE-2020-13956 |
CWE-ID | CWE-20 CWE-295 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Storage Protect for Space Management Other software / Other software solutions Storage Protect for Virtual Environments: Data Protection for VMware Other software / Other software solutions Storage Protect Client Other software / Other software solutions |
Vendor | IBM Corporation |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU77628
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2012-6153
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to modify files on the system.
The vulnerability exists due to Apache Commons HttpClient does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate. A remote attacker can pass specially crafted input to the application and modify files on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsStorage Protect for Space Management : before 8.1.20.0
Storage Protect for Virtual Environments: Data Protection for VMware : before 8.1.20.0
Storage Protect Client : before 8.1.20.0
CPE2.3 External linkshttp://www.ibm.com/support/pages/node/7037815
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU57150
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2014-3577
CWE-ID:
CWE-295 - Improper Certificate Validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to improper certificate validation. A remote attacker can perform a man-in-the-middle (MitM) attack and spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate.
MitigationInstall update from vendor's website.
Vulnerable software versionsStorage Protect for Space Management : before 8.1.20.0
Storage Protect for Virtual Environments: Data Protection for VMware : before 8.1.20.0
Storage Protect Client : before 8.1.20.0
CPE2.3 External linkshttp://www.ibm.com/support/pages/node/7037815
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU47481
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2020-13956
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected application.
The vulnerability exists due to insufficient validation of user-supplied input in Apache HttpClient. A remote attacker can pass request URIs to the library as java.net.URI object and force the application to pick the wrong target host for request execution.
MitigationInstall update from vendor's website.
Vulnerable software versionsStorage Protect for Space Management : before 8.1.20.0
Storage Protect for Virtual Environments: Data Protection for VMware : before 8.1.20.0
Storage Protect Client : before 8.1.20.0
CPE2.3 External linkshttp://www.ibm.com/support/pages/node/7037815
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?