ID CVE-2007-3262 Type cve Reporter cve@mitre.org Modified 2017-07-29T01:32:00
Description
Unspecified vulnerability in the Default Messaging Component in IBM WebSphere Application Server (WAS) 6.1.0.7 and earlier allows remote attackers to cause a denial of service related to a thread hang, and possibly related to a "TCP issue," or to MPAlarmThread and a resultant memory leak.
{"nessus": [{"lastseen": "2019-12-13T09:58:00", "bulletinFamily": "scanner", "description": "IBM WebSphere Application Server 6.1 before Fix Pack 7 appears to be\nrunning on the remote host. As such, it is reportedly affected by the\nfollowing vulnerabilities :\n\n - An unspecified denial of service vulnerability in the\n Java Message Service (JMS).\n\n - An unspecified vulnerability in the Servlet Engine/\n Web Container. (PK36447)\n\n - An unspecified vulnerability in the Default Messaging\n component could lead to a denial of service. \n\n - An unspecified vulnerability in the Default Messaging\n component which has unknown impact and attack vectors.", "modified": "2019-12-02T00:00:00", "id": "WEBSPHERE_6_1_0_7.NASL", "href": "https://www.tenable.com/plugins/nessus/45420", "published": "2010-04-05T00:00:00", "title": "IBM WebSphere Application Server 6.1 < 6.1.0.7 Multiple Vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(45420);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2018/08/06 14:03:16\");\n\n script_cve_id(\"CVE-2007-1944\", \"CVE-2007-1945\", \"CVE-2007-3262\", \"CVE-2007-3263\");\n script_bugtraq_id(23459);\n script_xref(name:\"Secunia\", value:\"24852\");\n script_xref(name:\"Secunia\", value:\"25704\");\n\n script_name(english:\"IBM WebSphere Application Server 6.1 < 6.1.0.7 Multiple Vulnerabilities\");\n script_summary(english:\"Reads the version number from the SOAP port\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote application server is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"IBM WebSphere Application Server 6.1 before Fix Pack 7 appears to be\nrunning on the remote host. As such, it is reportedly affected by the\nfollowing vulnerabilities :\n\n - An unspecified denial of service vulnerability in the\n Java Message Service (JMS).\n\n - An unspecified vulnerability in the Servlet Engine/\n Web Container. (PK36447)\n\n - An unspecified vulnerability in the Default Messaging\n component could lead to a denial of service. \n\n - An unspecified vulnerability in the Default Messaging\n component which has unknown impact and attack vectors.\");\n\n script_set_attribute(attribute:\"see_also\", value:\"http://www-1.ibm.com/support/docview.wss?uid=swg27007951#6107\");\n script_set_attribute(attribute:\"solution\", value:\"Apply Fix Pack 7 (6.1.0.7) or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/04/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/04/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/04/05\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:ibm:websphere_application_server\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Web Servers\");\n\n script_copyright(english:\"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"websphere_detect.nasl\");\n script_require_ports(\"Services/www\", 8880, 8881);\n script_require_keys(\"www/WebSphere\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\n\n\nport = get_http_port(default:8880);\n\n\nversion = get_kb_item(\"www/WebSphere/\"+port+\"/version\");\nif (isnull(version)) exit(1, \"Failed to extract the version from the IBM WebSphere Application Server instance listening on port \" + port + \".\");\nif (version =~ \"^[0-9]+(\\.[0-9]+)?$\")\n exit(1, \"Failed to extract a granular version from the IBM WebSphere Application Server instance listening on port \" + port + \".\");\n\nver = split(version, sep:'.', keep:FALSE);\nfor (i=0; i<max_index(ver); i++)\n ver[i] = int(ver[i]);\n\nif (ver[0] == 6 && ver[1] == 1 && ver[2] == 0 && ver[3] < 7)\n{\n if (report_verbosity > 0)\n {\n source = get_kb_item_or_exit(\"www/WebSphere/\"+port+\"/source\");\n\n report = \n '\\n Source : ' + source + \n '\\n Installed version : ' + version +\n '\\n Fixed version : 6.1.0.7' +\n '\\n';\n security_hole(port:port, extra:report);\n }\n else security_hole(port);\n exit(0);\n}\nelse exit(0, \"The WebSphere Application Server \"+version+\" instance listening on port \"+port+\" is not affected.\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}