Lucene search

K
ibmIBM50E6A01BD478DEED9D4635F64814BCBD9DE715353A82634EA217E4D53F3DC5D2
HistoryJun 16, 2018 - 2:07 p.m.

Security Bulletin: Multiple IBM InfoSphere Information Server components are vulnerable due to ClassLoader manipulation vulnerability in Open Source Apache Struts version 1 (CVE-2014-0114)

2018-06-1614:07:02
www.ibm.com
8

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Summary

Apache Struts could allow a remote attacker to execute arbitrary code on the system, caused by the failure to restrict the setting of Class Loader attributes. An attacker could exploit this vulnerability using the class parameter of an ActionForm object to manipulate the ClassLoader and execute arbitrary code on the system. IBM Information Server and constituent products are impacted.

Vulnerability Details

CVE ID:CVE-2014-0114****

CVSS:
CVSS Base Score: 7.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/92889 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Affected Products and Versions

IBM InfoSphere Information Server versions 8.0, 8.1, 8.5, 8.7, and 9.1,
IBM InfoSphere Information Server Information Services Director versions 8.0, 8.1, 8.5, 8.7, and 9.1,
IBM InfoSphere Information Server Business Glossary versions 8.0, 8.1 and 8.5,
IBM InfoSphere Information Server Metadata Workbench versions 8.0, 8.1, 8.5, 8.7, and 9.1,
each running on all platforms.
Also, IBM InfoSphere Data Click version 10.0 running on Linux

Remediation/Fixes

Product

| VRMF|APAR|Remediation/First Fix
—|—|—|—
InfoSphere Data Click| 10.0| JR50236| Contact IBM customer support to obtain the fix.
InfoSphere Information Server and components| 9.1| JR50236 JR50276
JR50202| --Apply IBM InfoSphere Information Server version 9.1.2.0
--Apply IBM InfoSphere Information Server Information Services Framework (ISF) _ 9.1.2 Rollup Patch 2_
--Apply the IBM InfoSphere Information Server Metadata Workbench Security Patch
**--**Follow instructions in the IBM InfoSphere Information Server Information Services Director TechNote
InfoSphere Information Server and components| 8.7| JR50236 JR50276
JR50202| --Apply IBM InfoSphere Information Server version 8.7 Fix Pack 2
--Apply the IBM InfoSphere Information Server Information Services Framework (ISF) Security Patch
--Apply the IBM InfoSphere Information Server Metadata Workbench Security Patch
**--**Follow instructions in the IBM InfoSphere Information Server Information Services Director TechNote
InfoSphere Information Server and components| 8.5| JR50236 JR50276
JR50202| --Apply IBM InfoSphere Information Server version 8.5 Fix Pack 3
--Apply IBM InfoSphere Information Server Information Services Framework (ISF) 8.5 Rollup Patch 2
--Apply the IBM InfoSphere Information Server Metadata Workbench Security Patch
--Apply the IBM InfoSphere Information Server Business Glossary Security Patch
**--**Follow instructions in the IBM InfoSphere Information Server Information Services Director TechNote
InfoSphere Information Server and components| 8.1| JR50236 JR50276
JR50202| --Apply IBM InfoSphere Information Server version 8.1 Fix Pack 2
**--**Follow instructions in the IBM InfoSphere Information Server Information Services Director TechNote
--Apply the IBM InfoSphere Information Server Information Services Framework (ISF) Security Patch
If you need the fix for Metadata Workbench or Business Glossary:
--Apply IBM InfoSphere Foundation Tools version 8.1.2 (available on Passport Advantage). Information available here.
--Apply IBM InfoSphere Information Server version 8.1.2 Fix Pack 5
--Apply the IBM InfoSphere Information Server Metadata Workbench Security Patch
--Apply the IBM InfoSphere Information Server Business Glossary Security Patch
InfoSphere Information Server and components| 8.0| None| Contact IBM customer support.

Note: The same fix may be listed under multiple vulnerabilities. Installing the fix addresses all vulnerabilities to which the fix applies. Also, some fixes require installing both a fix pack and a subsequent patch. While the fix pack must be installed first, any additional patches required may be installed in any order.

Workarounds and Mitigations

None known, apply fixes

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P