多款IBM产品信息泄露漏洞(CNVD-2018-11111)
CVE编号
CVE-2018-1464利用情况
暂无补丁情况
N/A披露时间
2018-05-18漏洞描述
IBM SAN Volume Controller(SVC)等都是美国IBM公司的存储系统。IBM SVC是一套虚拟化存储系统;Storwize是一套专为中小型企业定制的磁盘存储系统;Spectrum Virtualize是一套光谱存储系统;FlashSystem是一套全闪存存储系统。 多款IBM产品中存在安全漏洞。攻击者可利用该漏洞未授权读取内容。解决建议
厂商已发布漏洞修复程序,请及时关注更新:http://www-01.ibm.com/support/docview.wss?uid=ssg1S1012263;http://www-01.ibm.com/support/docview.wss?uid=ssg1S1012282;http://www-01.ibm.com/support/docview.wss?uid=ssg1S1012283受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize | * | From (including) 6.1.0.0 | Up to (excluding) 7.5.0.14 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize | * | From (including) 7.7.0.0 | Up to (excluding) 7.7.1.9 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize | * | From (including) 7.8.0.0 | Up to (excluding) 7.8.1.6 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize | * | From (including) 8.1.1.0 | Up to (excluding) 8.1.1.2 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize | * | From (including) 8.1.2.0 | Up to (excluding) 8.1.2.1 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize_for_public_cloud | * | From (including) 6.1.0.0 | Up to (excluding) 7.5.0.14 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize_for_public_cloud | * | From (including) 7.7.0.0 | Up to (excluding) 7.7.1.9 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize_for_public_cloud | * | From (including) 7.8.0.0 | Up to (excluding) 7.8.1.6 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize_for_public_cloud | * | From (including) 8.1.1.0 | Up to (excluding) 8.1.1.2 | ||||
运行在以下环境 | |||||||||
应用 | ibm | spectrum_virtualize_for_public_cloud | * | From (including) 8.1.2.0 | Up to (excluding) 8.1.2.1 | ||||
运行在以下环境 | |||||||||
系统 | anolis_os_7 | python-tools | * | Up to (excluding) 2.7.5-90 | |||||
运行在以下环境 | |||||||||
系统 | centos_7 | kernel | * | Up to (excluding) 3.10.0-957.1.3.el7 | |||||
运行在以下环境 | |||||||||
系统 | fedora_28 | pdns-recursor-debuginfo | * | Up to (excluding) 4.1.8-1.fc28 | |||||
运行在以下环境 | |||||||||
系统 | fedora_29 | pdns-recursor-debuginfo | * | Up to (excluding) 4.1.7-1.fc29 | |||||
运行在以下环境 | |||||||||
系统 | fedora_30 | python-unversioned-command | * | Up to (excluding) 2.7.16-1.fc30 | |||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_6 | python34-debuginfo | * | Up to (excluding) 3.4.10-1.el6 | |||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_7 | pdns-recursor-debuginfo | * | Up to (excluding) 3.4.10-1.el7 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | haproxy | * | Up to (excluding) 4.1.2-lp150.2.3.1 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.1 | libpython3_6m1_0 | * | Up to (excluding) 3.6.10-lp151.6.7.1 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | pdns-recursor | * | Up to (excluding) 4.0.5-9.1 | |||||
运行在以下环境 | |||||||||
系统 | redhat_7 | 389-ds-base | * | Up to (excluding) 3.10.0-957.1.3.el7 | |||||
运行在以下环境 | |||||||||
系统 | suse_12 | python-devel | * | Up to (excluding) 2.7.13-28.31 | |||||
运行在以下环境 | |||||||||
系统 | suse_12_SP4 | libpython3_4m1_0 | * | Up to (excluding) 3.4.6-25.29.1 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04.6_lts | python2.7 | * | Up to (excluding) 2.7.6-8ubuntu0.5 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04.7_lts | python2.7 | * | Up to (excluding) 2.7.12-1ubuntu0~16.04.4 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04.5_lts | python2.7 | * | Up to (excluding) 2.7.15~rc1-1ubuntu0.1 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.10 | python2.7 | * | Up to (excluding) 2.7.15-4ubuntu4 | |||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 低
- 影响范围 未更改
- 用户交互 无
- 可用性 无
- 保密性 高
- 完整性 无
CWE-ID | 漏洞类型 |
CWE-200 | 信息暴露 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论