IBM Storage Virtualize 8.4, 8.5, 8.7, and 9.1 IKEv1 implementation allows remote attackers to obtain sensitive information from device memory via a Security Association (SA) negotiation request.
Using realloc() to resize buffers that store sensitive information can leave the sensitive information exposed to attack, because it is not removed from memory.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Storage_virtualize | Ibm | 8.4.0.0 (including) | 8.4.0.0 (including) |
| Storage_virtualize | Ibm | 8.5.0.0 (including) | 8.5.0.0 (including) |
| Storage_virtualize | Ibm | 8.7.0.0 (including) | 8.7.0.0 (including) |
| Storage_virtualize | Ibm | 9.1.0.0 (including) | 9.1.0.0 (including) |