Lucene search

K
ibmIBM706D99B639D7E81DE32939C6E38CFFF8B3EE3C64791BE8296A7D64F4752EC724
HistorySep 15, 2022 - 6:56 p.m.

Security Bulletin: Security vulnerability in IBM WebSphere Application Server, which is shipped with IBM Business Process Manager (BPM): CPU Utilization (CVE-2014-0963)

2022-09-1518:56:48
www.ibm.com
11

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

0.059 Low

EPSS

Percentile

93.3%

Summary

IBM WebSphere Application Server is shipped as a component of IBM Business Process Manager. Information about a security vulnerability, which affects IBM WebSphere Application Server, has been published in a security bulletin.

Vulnerability Details

For vulnerability details, see the Security Bulletin: IBM HTTP Server CPU utilization (CVE-2014-0963) document for IBM WebSphere Application Server.

Affected Products and Versions

The following products are affected:

  • WebSphere Process Server V6.1.2.x, 6.2.x, 7.0.x
  • WebSphere Process Server for z/OS 6.2.x, 7.0.x
  • WebSphere Lombardi Edition 7.2.x
  • WebSphere Process Server Hypervisor Edition for Red Hat Enterprise Linux Server for x86 (32-bit) 7.0.x
  • WebSphere Process Server Hypervisor Edition for Novell SUSE Linux Enterprise Server for x86 (32-bit) 6.2.x, 7.0.x
  • WebSphere Process Server Hypervisor Edition for Novell SUSE Linux Enterprise Server for System z 6.2.x, 7.0.x
  • IBM Business Process Manager Standard V7.5.x, 8.0.x, 8.5.x
  • IBM Business Process Manager Express V7.5.x, 8.0.x, 8.5.x
  • IBM Business Process Manager Advanced V7.5.x, 8.0.x, 8.5.x

**Important note:**IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes are posted to this portal. Review the CVSS scores and apply all security or integrity fixes as soon as possible to minimize any potential risk.

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

0.059 Low

EPSS

Percentile

93.3%

Related for 706D99B639D7E81DE32939C6E38CFFF8B3EE3C64791BE8296A7D64F4752EC724