CNVD-2015-02809

Vulnerability from cnvd - Published: 2015-04-30
VLAI Severity ?
Title
IBM WebSphere Application Server (WAS) SNMP实现敏感信息泄露漏洞
Description
IBM WebSphere Application Server(WAS)是美国IBM公司开发并发行的一款应用服务器产品,它是Java EE和Web服务应用程序的平台,也是IBM WebSphere软件平台的基础。 IBM WebSphere Application Server (WAS)存在安全漏洞,由于SNMP实现未正确处理配置数据。允许攻击者利用此漏洞获取敏感信息。
Severity
Patch Name
IBM WebSphere Application Server (WAS) SNMP实现敏感信息泄露漏洞的补丁
Patch Description
IBM WebSphere Application Server(WAS)是美国IBM公司开发并发行的一款应用服务器产品,它是Java EE和Web服务应用程序的平台,也是IBM WebSphere软件平台的基础。 IBM WebSphere Application Server (WAS)存在安全漏洞,由于SNMP实现未正确处理配置数据。允许攻击者利用此漏洞获取敏感信息。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已经发布升级补丁/版本以修复这个安全问题,请用户及时下载更新: http://www-01.ibm.com/support/docview.wss?uid=swg21697368

Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21697368 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0174
Impacted products
Name
IBM WebSphere Application Server (WAS) 8.5
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2015-0174"
    }
  },
  "description": "IBM WebSphere Application Server\uff08WAS\uff09\u662f\u7f8e\u56fdIBM\u516c\u53f8\u5f00\u53d1\u5e76\u53d1\u884c\u7684\u4e00\u6b3e\u5e94\u7528\u670d\u52a1\u5668\u4ea7\u54c1\uff0c\u5b83\u662fJava EE\u548cWeb\u670d\u52a1\u5e94\u7528\u7a0b\u5e8f\u7684\u5e73\u53f0\uff0c\u4e5f\u662fIBM WebSphere\u8f6f\u4ef6\u5e73\u53f0\u7684\u57fa\u7840\u3002\r\n\r\nIBM WebSphere Application Server (WAS)\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u7531\u4e8eSNMP\u5b9e\u73b0\u672a\u6b63\u786e\u5904\u7406\u914d\u7f6e\u6570\u636e\u3002\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u6b64\u6f0f\u6d1e\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002",
  "discovererName": "IBM",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u5347\u7ea7\u8865\u4e01/\u7248\u672c\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u7528\u6237\u53ca\u65f6\u4e0b\u8f7d\u66f4\u65b0\uff1a\r\nhttp://www-01.ibm.com/support/docview.wss?uid=swg21697368",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2015-02809",
  "openTime": "2015-04-30",
  "patchDescription": "IBM WebSphere Application Server\uff08WAS\uff09\u662f\u7f8e\u56fdIBM\u516c\u53f8\u5f00\u53d1\u5e76\u53d1\u884c\u7684\u4e00\u6b3e\u5e94\u7528\u670d\u52a1\u5668\u4ea7\u54c1\uff0c\u5b83\u662fJava EE\u548cWeb\u670d\u52a1\u5e94\u7528\u7a0b\u5e8f\u7684\u5e73\u53f0\uff0c\u4e5f\u662fIBM WebSphere\u8f6f\u4ef6\u5e73\u53f0\u7684\u57fa\u7840\u3002\r\n\r\nIBM WebSphere Application Server (WAS)\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u7531\u4e8eSNMP\u5b9e\u73b0\u672a\u6b63\u786e\u5904\u7406\u914d\u7f6e\u6570\u636e\u3002\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u6b64\u6f0f\u6d1e\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "IBM WebSphere Application Server (WAS) SNMP\u5b9e\u73b0\u654f\u611f\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "IBM WebSphere Application Server (WAS) 8.5"
  },
  "referenceLink": "http://www-01.ibm.com/support/docview.wss?uid=swg21697368\r\nhttps://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0174",
  "serverity": "\u4f4e",
  "submitTime": "2015-04-29",
  "title": "IBM WebSphere Application Server (WAS) SNMP\u5b9e\u73b0\u654f\u611f\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…