By crafting a malicious command that then shows up in the output of
ps users of monitored hosts could gain root privileges.
This was achieved by exploiting the insufficient quoting when using ksh's
eval to create the required environment.
This issue was found during internal review.
- 2.0.0 (EOL) and older
If updating is not possible, disable the Tivoli Storage Manager plugin.
We have rated the issue with a CVSS score of 8.8 (High) with the following CVSS vector:
We have assigned
With this change we no longer use
eval and fixe the quoting.
This prevents variable exports being missinterpreted as commands to execute.
To the list of all Werks