CVE-2013-6737
Published Jun 21, 2014
Last updated 7 years ago
Overview
- Description
- IBM System Storage Storwize V7000 Unified 1.3.x and 1.4.x before 1.4.3.0 does not properly restrict the content of a dump file upon encountering a 1691 hardware fault, which allows remote authenticated users to obtain sensitive customer-data fragments by reading this file after it is copied.
- Source
- psirt@us.ibm.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:storwize_unified_v7000_software:1.3.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4081A9F2-F548-497E-B416-A9FDD793348A" }, { "criteria": "cpe:2.3:a:ibm:storwize_unified_v7000_software:1.3.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9CA982FB-D1DC-463F-8C41-351F0483ECFB" }, { "criteria": "cpe:2.3:a:ibm:storwize_unified_v7000_software:1.4.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A9E3208-9ED0-4D9F-A06A-7A568032251C" }, { "criteria": "cpe:2.3:a:ibm:storwize_unified_v7000_software:1.4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FFE8A36E-E2FD-47F7-AA04-9E6651314E9E" }, { "criteria": "cpe:2.3:a:ibm:storwize_unified_v7000_software:1.4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BB4EEAC-1451-4819-BF01-4398B328137B" }, { "criteria": "cpe:2.3:a:ibm:storwize_unified_v7000_software:1.4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C22A768-16FA-46B4-A1BC-79C6C0329771" }, { "criteria": "cpe:2.3:a:ibm:storwize_unified_v7000_software:1.4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE4DF44F-794B-426A-9A2C-AA2BEFF8576C" }, { "criteria": "cpe:2.3:a:ibm:storwize_unified_v7000_software:1.4.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EB7D3C9-A45C-4437-8B47-40DA0502B771" }, { "criteria": "cpe:2.3:a:ibm:storwize_unified_v7000_software:1.4.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6BAF011E-B681-4043-B90B-2703508CED2B" }, { "criteria": "cpe:2.3:a:ibm:storwize_unified_v7000_software:1.4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A12F0D1C-0BBD-425E-8110-B93A654A7CD1" }, { "criteria": "cpe:2.3:a:ibm:storwize_unified_v7000_software:1.4.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBA9D506-2F37-403D-8112-5E1D941AB4D1" }, { "criteria": "cpe:2.3:a:ibm:storwize_unified_v7000_software:1.4.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD6D34A9-01C1-4375-99FE-F6950AA05966" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:ibm:storwize_unified_v7000:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "969B07CF-DEB1-4463-B361-D6A49642F75A" } ], "operator": "OR" } ], "operator": "AND" } ]