IBM Sterling Control Center has various Denial-of-Service (DOS) and Cross Site Scripting (XSS) vulnerabilities.
VULNERABILITY DETAILS:
CVE ID: CVE-2013-2968
DESCRIPTION: - Denial of Service
IBM Sterling Control Center (SCC) uses a buffer read method which can potentially result in a Denial of Service (DoS) if a user causes SCC to read a file and the file is large and has no EOL characters.
CVSS Base Score: 6.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/83859 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/AU:S/C:N/I:N/A:C)
CVE ID: CVE-2013-2969
DESCRIPTION: - Cross Site Scripting
IBM Sterling Control Center allows some invalid characters to be returned to the user, whereby a cross-site scripting (XSS) attack could occur. When a web application uses input from a user in the output it generates without filtering it, an attacker can insert an attack in that input and the web application sends the attack to other users.
CVSS Base Score: 3.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/83860 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/AU:S/C:N/I:P/A:N)
AFFECTED PRODUCTS AND VERSIONS:
IBM Sterling Control Center 5.4 through 5.4.0.1
IBM Sterling Control Center 5.3 through 5.3.0.3
IBM Sterling Control Center 5.2 through 5.2.0.8
REMEDIATION:
The recommended solution is to upgrade to the current release as soon as practical. Please see below for information about the fixes available.
_Fix_* | VRMF | APAR | How to acquire fix |
---|---|---|---|
iFix 1 | 5.4.0.1 | N/A | IBM Sterling Control Center 5.4.0.1 available on Fix Central |
| 5.3.0.4| N/A| IBM Sterling Control Center 5.3.0.4 available on IBM Fix Central
| 5.2.0.9| N/A| Control Center 5.2.09 is now available on IWM
REFERENCES:
ยท Complete CVSS Guide
ยท On-line Calculator V2_ _
ยท CVE-2013-2968__ __
ยท X-Force Vulnerability Database
ยท CVE-2013-2969__ __
ยท X-Force Vulnerability Database
RELATED INFORMATION:
_IBM Secure Engineering Web Portal _
IBM Product Security Incident Response Blog
CHANGE HISTORY
11 June 2013 Original Copy Published
_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _
_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an โindustry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.โ IBM PROVIDES THE CVSS SCORES โAS ISโ WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
[{โProductโ:{โcodeโ:โSS9GLAโ,โlabelโ:โIBM Control Centerโ},โBusiness Unitโ:{โcodeโ:โBU059โ,โlabelโ:โIBM Software w/o TPSโ},โComponentโ:โNot Applicableโ,โPlatformโ:[{โcodeโ:โPF002โ,โlabelโ:โAIXโ},{โcodeโ:โPF010โ,โlabelโ:โHP-UXโ},{โcodeโ:โPF016โ,โlabelโ:โLinuxโ},{โcodeโ:โPF027โ,โlabelโ:โSolarisโ},{โcodeโ:โPF033โ,โlabelโ:โWindowsโ}],โVersionโ:โ5.4.0.1;5.4;5.3;5.2โ,โEditionโ:โโ,โLine of Businessโ:{โcodeโ:โLOB59โ,โlabelโ:โSustainability Softwareโ}}]