IBM WebSphere Message up to 8.0 HTTPInput Node memory corruption
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.5 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as problematic, has been found in IBM WebSphere Message up to 8.0. Affected by this issue is some unknown functionality of the component HTTPInput Node. Performing a manipulation results in memory corruption. This vulnerability is identified as CVE-2012-5953. There is not any exploit available. Applying a patch is the recommended action to fix this issue.
Details
A vulnerability was found in IBM WebSphere Message up to 8.0 (Application Server Software). It has been classified as critical. This affects an unknown functionality of the component HTTPInput Node. The manipulation with an unknown input leads to a memory corruption vulnerability. CWE is classifying the issue as CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. This is going to have an impact on availability. The summary by CVE is:
IBM WebSphere Message Broker 6.1 before 6.1.0.12, 7.0 before 7.0.0.6, and 8.0 before 8.0.0.2, when the Parse Query Strings option is enabled on an HTTPInput node, allows remote attackers to cause a denial of service (infinite loop) via a crafted query string.
The weakness was released 02/12/2013 as swg21623316 as confirmed bulletin (Website). The advisory is shared at www-01.ibm.com. This vulnerability is uniquely identified as CVE-2012-5953 since 11/21/2012. The exploitability is told to be easy. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Neither technical details nor an exploit are publicly available.
Upgrading to version 6.1.0.12 eliminates this vulnerability. Applying the patch APAR PM75015 is able to eliminate this problem. The best possible mitigation is suggested to be patching the affected component. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (80667), SecurityFocus (BID 57938†), OSVDB (90181†), Secunia (SA52176†) and Vulnerability Center (SBV-38809†). Entries connected to this vulnerability are available at VDB-7702 and VDB-7704. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.ibm.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.5VulDB Meta Temp Score: 6.5
VulDB Base Score: 7.5
VulDB Temp Score: 6.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: WebSphere Message 6.1.0.12
Patch: APAR PM75015
Timeline
11/21/2012 🔍02/12/2013 🔍
02/12/2013 🔍
02/12/2013 🔍
02/12/2013 🔍
02/13/2013 🔍
02/18/2013 🔍
02/20/2013 🔍
03/18/2013 🔍
04/26/2017 🔍
Sources
Vendor: ibm.comAdvisory: swg21623316
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2012-5953 (🔍)
GCVE (CVE): GCVE-0-2012-5953
GCVE (VulDB): GCVE-100-7701
X-Force: 80667 - IBM WebSphere Message Broker DataFlowEngine denial of service, Medium Risk
SecurityFocus: 57938 - IBM WebSphere Message Broker Multiple Security Vulnerabilities
Secunia: 52176 - IBM WebSphere Message Broker Multiple Vulnerabilities, Moderately Critical
OSVDB: 90181
Vulnerability Center: 38809 - IBM WebSphere Message Broker Remote Denial of Service Vulnerability With Parse Query Strings Enabled, High
See also: 🔍
Entry
Created: 02/18/2013 11:38Updated: 04/26/2017 08:58
Changes: 02/18/2013 11:38 (74), 04/26/2017 08:58 (1)
Complete: 🔍
Committer: olku
Cache ID: 216:EF0:103
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
No comments yet. Languages: en.
Please log in to comment.