IBM Storage Scale 5.2.3.0 and 5.2.3.1 could allow an authenticated user to obtain sensitive information from files due to the insecure permissions inherited through the SMB protocol.
Solution:
A product defines a set of insecure permissions that are inherited by objects that are created by the program.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://www.ibm.com/support/pages/node/7239562 | patch vendor advisory |