Security Bulletin: IBM Cognos TM1 Admin Server vulnerabilities (CVE-2012-0202)
The tm1admsd.exe server contains a security vulnerability shipped by IBM Cognos TM1 Admin Server versions 9.4.1 and 9.5.X prior to 9.5.2 FP2. The vulnerability allow a remote attacker that has access to the server and port that the server is listening on to cause a Denial of Service (DoS) attack and potentially execute arbitrary code.
CVE IDs: CVE-2012-0202
DESCRIPTION: It is possible that a remote attacker can send maliciously crafted data to the TM1 Admin server which would result in a buffer overflow condition on the server running this software. The exposures range from crashing the TM1 Admin Server process through to potentially inserting code of their design to run within the TM1 Admin Server Process.
As of March 31, 2012, IBM has not received any reports of customer issues related to these security vulnerabilities.
This vulnerability was reported to IBM by TippingPoint.
Using the Common Vulnerability Scoring System (CVSS) v2, the security ratings for these issues are:
CVSS Base Score: 10
CVSS Temporal Score: See the corresponding X-Force reference for each CVE for the current score:
CVE-2012-0202 – See https://exchange.xforce.ibmcloud.com/vulnerabilities/73182
CVSS Environmental Score: Undefined
CVSS String: (AV:N/AC:L/Au:N/C:C/I:C/A:C)
IBM Cognos TM1 Admin Server (on all platforms) v 9.4.1
IBM Cognos TM1 Admin Server (on all platforms) v 9.5.x prior to 9.5.2 FP2
Note: This vulnerability has already been addressed in the shipping version of the admin server included with IBM Cognos TM1 10.1 (released Feb. 7, 2012) and is included with the latest 9.5.2 Fix Pack (IBM Cognos TM1 9.5.2 FP2 released March 30, 2012).
The recommended solution is to apply the fixes for your release version as soon as practical.
Updated versions of the TM1 Admin Server for affected platforms have been made available on Fix Central. The updated versions include the Admin Server executables which have been updated with just the fix to address this vulnerability. Please download and replace your current version of these files with the newly provided ones as soon as possible.
For more information on the potential issue, and instructions on downloading and installing the interim fix, please see the following download documents.
Cognos TM1 9.4.1 Interim Fix 2
Cognos TM1 9.5.1 Interim Fix 3
Cognos TM1 9.5.2 Interim Fix 4
Mitigation(s): None known, apply the fixes.
Get Notified about Future Security Bulletins
ReferencesComplete CVSS v2 Guide
On-line Calculator v2
Related informationIBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
Translate this page: