3.1 Low
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
3.5 Low
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:S/C:P/I:N/A:N
There is a potential bypass security restriction vulnerability in IBM WebSphere Application Server. This will only occur in environments that have the webcontainer custom property HttpSessionIdReuse enabled.
CVEID: CVE-2016-0385**
DESCRIPTION:** IBM WebSphere Application Server could allow a remote attacker to bypass security restrictions caused by a buffer overflow. This could allow the attacker to view unauthorized data.
CVSS Base Score: 3.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/112359 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)
This vulnerability affects the following versions and releases of IBM WebSphere Application Server
The recommended solution is to apply the interim fix, Fix Pack or PTF containing APAR PI60026 for each named product as soon as practical. **
For WebSphere Application Server:** **
For Liberty:**
· Upgrade to minimal fix pack levels as required by interim fix and then apply Interim Fix PI60026
--OR–
· Apply Fix Pack 16.0.0.3 or later.
**
For V9.0.0.0:**
· Upgrade to minimal fix pack levels as required by interim fix and then apply Interim Fix PI60026
--OR–
· Apply Fix Pack 9.0.0.1 or later.
For V8.5.0.0 through 8.5.5.9:
· Upgrade to minimal fix pack levels as required by interim fix and then apply Interim Fix PI60026
--OR–
· Apply Fix Pack 8.5.5.10 or later.
For V8.0.0.0 through 8.0.0.12:
· Upgrade to a minimal fix pack levels as required by interim fix and then apply Interim Fix PI60026
--OR–
· Apply Fix Pack 8.0.0.13 or later. **
For V7.0.0.0 through 7.0.0.41:**
· Upgrade to minimal fix pack levels as required by interim fix and then apply Interim Fix PI60026
--OR–
· Apply Fix Pack 7.0.0.43 or later.
Setting the webcontainer property HttpSessionIdReuse to false will mitigate this issue.
3.1 Low
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
3.5 Low
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:S/C:P/I:N/A:N