ID CVE-2020-4310 Type cve Reporter cve@mitre.org Modified 2020-06-20T18:32:00
Description
IBM MQ and MQ Appliance 7.1, 7.5, 8.0, 9.0 LTS, 9.1 LTS, and 9.1 C are vulnerable to a denial of service attack due to an error within the Data Conversion logic. IBM X-Force ID: 177081.
{"nessus": [{"lastseen": "2020-08-22T21:58:11", "description": "According to its self-reported version, the IBM MQ server installed on the\nremote host is 8.0.0.x prior to 8.0.0.14 or 9.1.0.x prior to 9.1.0.5 LTS or 9.1.5 CD \nand is therefore affected by a denial of service vulnerability. An authenticated,\nremote attacker can exploit this issue and cause an error in the data conversion\nlogic that will crash the affected host.", "edition": 3, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2020-06-19T00:00:00", "title": "IBM MQ 7.1.x / 7.5.x / 8.0.0.x < 8.0.0.15 / 9.0.0.x < 9.0.0.10 / 9.1.0.x < 9.1.0.5 LTS / 9.1.x < 9.1.5 CD Denial of Service Vulnerability (DoS)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-4310"], "modified": "2020-06-19T00:00:00", "cpe": ["cpe:/a:ibm:websphere_mq"], "id": "WEBSPHERE_MQ_IBM6223914.NASL", "href": "https://www.tenable.com/plugins/nessus/137658", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(137658);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/08/21\");\n\n script_cve_id(\"CVE-2020-4310\");\n script_xref(name:\"IAVA\", value:\"2020-A-0269-S\");\n\n script_name(english:\"IBM MQ 7.1.x / 7.5.x / 8.0.0.x < 8.0.0.15 / 9.0.0.x < 9.0.0.10 / 9.1.0.x < 9.1.0.5 LTS / 9.1.x < 9.1.5 CD Denial of Service Vulnerability (DoS)\");\n script_summary(english:\"Checks the version of IBM MQ.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A message queuing service installed on the remote host is affected\nby a denial of service vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its self-reported version, the IBM MQ server installed on the\nremote host is 8.0.0.x prior to 8.0.0.14 or 9.1.0.x prior to 9.1.0.5 LTS or 9.1.5 CD \nand is therefore affected by a denial of service vulnerability. An authenticated,\nremote attacker can exploit this issue and cause an error in the data conversion\nlogic that will crash the affected host.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.ibm.com/support/pages/node/6223914\");\n script_set_attribute(attribute:\"solution\", value:\n\"Install the fix for APAR IT30605 or upgrade to IBM MQ 8.0.0.15, 9.0.0.10, 9.1.0.5 LTS, 9.1.5 CD or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-4310\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/04/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/04/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/06/19\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:ibm:websphere_mq\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"websphere_mq_installed.nasl\");\n script_require_keys(\"installed_sw/IBM WebSphere MQ\", \"Settings/ParanoidReport\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"install_func.inc\");\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\napp_name = \"IBM WebSphere MQ\";\ninstall = get_single_install(app_name:app_name, exit_if_unknown_ver:TRUE);\n\nversion = install['version'];\npath = install['path'];\nfix = NULL;\n\nif(version =~ \"^7\\.1\\.\" || version =~ \"^7\\.5\\.\")\n{\n fix = 'Apply Interim Fix APAR IT30605';\n flag = TRUE;\n} # 8.0.x < 8.0.0.15\nelse if (version =~ \"^8\\.0\\.0\\.\")\n{\n fix = \"8.0.0.15\";\n}\nelse if (version =~ \"^9\\.0\\.\")\n{\n fix = \"9.0.0.10\";\n}\n# 9.1.x < 9.1.0.5 LTS\nelse if (version =~ \"^9\\.1\\.0\\.\")\n{\n fix = \"9.1.0.5\";\n}\n# 9.1.1 < 9.1.5 CD\nelse if (version =~ \"^9\\.1\\.[1-4]($|\\.)\")\n{\n fix = \"9.1.5\";\n}\nelse\n audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);\n\nif(flag || ver_compare(ver:version, fix:fix, strict:FALSE) == -1)\n{\n port = get_kb_item(\"SMB/transport\");\n if (!port) port = 445;\n report =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n security_report_v4(port:port, extra:report, severity:SECURITY_WARNING);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}]}