多款IBM产品信息泄露漏洞(CNVD-2018-11113)
CVE编号
CVE-2018-1466利用情况
暂无补丁情况
N/A披露时间
2018-05-18漏洞描述
IBM SAN Volume Controller(SVC)等都是美国IBM公司的存储系统。IBM SVC是一套虚拟化存储系统;Storwize是一套专为中小型企业定制的磁盘存储系统;Spectrum Virtualize是一套光谱存储系统;FlashSystem是一套全闪存存储系统。 多款IBM产品中存在安全漏洞,该漏洞源于程序使用了较弱的加密算法。攻击者可利用该漏洞解密敏感信息。解决建议
厂商已发布漏洞修复程序,请及时关注更新:http://www-01.ibm.com/support/docview.wss?uid=ssg1S1012263;http://www-01.ibm.com/support/docview.wss?uid=ssg1S1012282;http://www-01.ibm.com/support/docview.wss?uid=ssg1S1012283受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize | * | From (including) 6.1.0.0 | Up to (excluding) 7.5.0.14 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize | * | From (including) 7.7.0.0 | Up to (excluding) 7.7.1.9 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize | * | From (including) 7.8.0.0 | Up to (excluding) 7.8.1.6 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize | * | From (including) 8.1.1.0 | Up to (excluding) 8.1.1.2 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize | * | From (including) 8.1.2.0 | Up to (excluding) 8.1.2.1 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize_for_public_cloud | * | From (including) 6.1.0.0 | Up to (excluding) 7.5.0.14 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize_for_public_cloud | * | From (including) 7.7.0.0 | Up to (excluding) 7.7.1.9 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize_for_public_cloud | * | From (including) 7.8.0.0 | Up to (excluding) 7.8.1.6 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize_for_public_cloud | * | From (including) 8.1.1.0 | Up to (excluding) 8.1.1.2 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize_for_public_cloud | * | From (including) 8.1.2.0 | Up to (excluding) 8.1.2.1 | ||||
运行在以下环境 | |||||||||
系统 | centos_7 | glusterfs-devel | * | Up to (excluding) 3.12.2-25.el7 | |||||
运行在以下环境 | |||||||||
系统 | fedora_28 | glusterfs-geo-replication | * | Up to (excluding) 4.1.6-1.fc28 | |||||
运行在以下环境 | |||||||||
系统 | fedora_29 | glusterfs-geo-replication | * | Up to (excluding) 12.2.11-1.fc29 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | python3-rgw | * | Up to (excluding) 13.2.4.125 | |||||
运行在以下环境 | |||||||||
系统 | redhat_7 | xorg-x11-server-Xdmx | * | Up to (excluding) 3.12.2-25.el7 | |||||
运行在以下环境 | |||||||||
系统 | suse_12 | xorg-x11-server | * | Up to (excluding) 1.19.6-2 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04.6_lts | xorg-server | * | Up to (excluding) 2:1.15.1-0ubuntu2.11 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04.7_lts | xorg-server | * | Up to (excluding) 2:1.18.4-0ubuntu0.8 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04.5_lts | xorg-server | * | Up to (excluding) 2:1.19.6-1ubuntu4.2 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.10 | ceph | * | Up to (excluding) 13.2.4+dfsg1-0ubuntu0.18.10.1 | |||||
- 攻击路径 网络
- 攻击复杂度 高
- 权限要求 低
- 影响范围 未更改
- 用户交互 无
- 可用性 无
- 保密性 高
- 完整性 无
CWE-ID | 漏洞类型 |
CWE-326 | 不充分的加密强度 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论