Spectrum Protect Space Management IBM Spectrum Protect Space Management

Do you want an email whenever new security vulnerabilities are reported in IBM Spectrum Protect Space Management?

By the Year

In 2024 there have been 0 vulnerabilities in IBM Spectrum Protect Space Management . Spectrum Protect Space Management did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 2 6.65
2020 0 0.00
2019 0 0.00
2018 1 8.10

It may take a day or so for new Spectrum Protect Space Management vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent IBM Spectrum Protect Space Management Security Vulnerabilities

IBM Spectrum Protect Client 8.1.0.0-8 through 1.11.0 is vulnerable to a stack-based buffer overflow

CVE-2021-29672 7.8 - High - April 26, 2021

IBM Spectrum Protect Client 8.1.0.0-8 through 1.11.0 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking when processing the current locale settings. A local attacker could overflow a buffer and execute arbitrary code on the system with elevated privileges or cause the application to crash. IBM X-Force ID: 199479

Memory Corruption

IBM Spectrum Protect Client 8.1.0.0 through 8.1.11.0 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking

CVE-2021-20546 5.5 - Medium - April 26, 2021

IBM Spectrum Protect Client 8.1.0.0 through 8.1.11.0 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local attacker could overflow a buffer and cause the application to crash. IBM X-Force ID: 198934

Memory Corruption

The GSKit (IBM Spectrum Protect 7.1 and 7.2) and (IBM Spectrum Protect Snapshot 4.1.3

CVE-2018-1447 8.1 - High - April 04, 2018

The GSKit (IBM Spectrum Protect 7.1 and 7.2) and (IBM Spectrum Protect Snapshot 4.1.3, 4.1.4, and 4.1.6) CMS KDB logic fails to salt the hash function resulting in weaker than expected protection of passwords. A weak password may be recovered. Note: After update the customer should change password to ensure the new password is stored more securely. Products should encourage customers to take this step as a high priority action. IBM X-Force ID: 139972.

Use of Password Hash With Insufficient Computational Effort

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for IBM Spectrum Protect Snapshot or by IBM? Click the Watch button to subscribe.

IBM
Vendor

subscribe