Lucene search

K
ibmIBM8404BFC03753349F5F72F45CEDCF5608A605BF448B6221099094F05DE03C568E
HistorySep 25, 2022 - 9:06 p.m.

Security Bulletin: Potential Security exposure in IBM HTTP Server CVE-2013-1896 PM89996

2022-09-2521:06:56
www.ibm.com
21

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.958 High

EPSS

Percentile

99.4%

Abstract

Potential Security exposure in IBM HTTP Server for WebSphere Application Server

Content

VULNERABILITY DETAILS:

CVE ID:CVE-2013-1896******

DESCRIPTION: **IBM HTTP Server may be vulnerable to a denial of service, caused by a malicious request when using the optional mod_dav module.

CVSS: _

CVSS Base Score: 4.3
CVSS Temporal Score: See _https://exchange.xforce.ibmcloud.com/vulnerabilities/85574 for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:N/AC:M/Au:N/C:N/I:N/A:P)
**

VERSIONS AFFECTED: **This problem affects the IBM HTTP Server component in all editions of WebSphere Application Server and bundling products:
ยท Version 8.5
ยท Version 8
ยท Version 7
ยท Version 6.1

**REMEDIATION:**The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical

**Fix:Apply a Fix Pack or PTF containing this APAR PM89996, as noted below:

For affected IBM HTTP Server for WebSphere Application Server:**

For V8.5.0.0 through 8.5.5.0 Full Profile:

--ORโ€“

  • Apply Fix Pack 8.5.5.1 or later.

** For V8.0 through 8.0.0.6:**

--ORโ€“

  • Apply Fix Pack 8.0.0.7 or later.

For V7.0.0.0 through 7.0.0.29:

--ORโ€“

  • Apply Fix Pack 7.0.0.31 or later.

For V6.1.0.0 through 6.1.0.45:

--ORโ€“

  • Apply Fix Pack 6.1.0.47 or later.

ยท Workaround(s): None

ยท Mitigation(s): Do not use optional mod_dav module.

**Important note:**IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.

For additional details and information on WebSphere Application Server product updates:

REFERENCES:_
_ยท _Complete CVSS Guide __
_ยท _On-line Calculator V2 _

CHANGE HISTORY:

  • 26 August 2013: Original copy published
  • 18 September 2013: updated Xforce Database Link

_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _

_
Note: _
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an โ€œindustry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.โ€ IBM PROVIDES THE CVSS SCORES โ€œAS ISโ€ WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{โ€œProductโ€:{โ€œcodeโ€:โ€œSSEQTPโ€,โ€œlabelโ€:โ€œWebSphere Application Serverโ€},โ€œBusiness Unitโ€:{โ€œcodeโ€:โ€œBU059โ€,โ€œlabelโ€:โ€œIBM Software w/o TPSโ€},โ€œComponentโ€:โ€œIBM HTTP Serverโ€,โ€œPlatformโ€:[{โ€œcodeโ€:โ€œPF002โ€,โ€œlabelโ€:โ€œAIXโ€},{โ€œcodeโ€:โ€œPF010โ€,โ€œlabelโ€:โ€œHP-UXโ€},{โ€œcodeโ€:โ€œPF016โ€,โ€œlabelโ€:โ€œLinuxโ€},{โ€œcodeโ€:โ€œPF027โ€,โ€œlabelโ€:โ€œSolarisโ€},{โ€œcodeโ€:โ€œPF033โ€,โ€œlabelโ€:โ€œWindowsโ€}],โ€œVersionโ€:โ€œ8.5.5;8.5;8.0;7.0;6.1โ€,โ€œEditionโ€:โ€œBase;Developer;Express;Network Deploymentโ€,โ€œLine of Businessโ€:{โ€œcodeโ€:โ€œLOB45โ€,โ€œlabelโ€:โ€œAutomationโ€}},{โ€œProductโ€:{โ€œcodeโ€:โ€œSSEQTJโ€,โ€œlabelโ€:โ€œIBM HTTP Serverโ€},โ€œBusiness Unitโ€:{โ€œcodeโ€:โ€œBU059โ€,โ€œlabelโ€:โ€œIBM Software w/o TPSโ€},โ€œComponentโ€:โ€œBase Serverโ€,โ€œPlatformโ€:[{โ€œcodeโ€:โ€œPF002โ€,โ€œlabelโ€:โ€œAIXโ€},{โ€œcodeโ€:โ€œPF010โ€,โ€œlabelโ€:โ€œHP-UXโ€},{โ€œcodeโ€:โ€œPF016โ€,โ€œlabelโ€:โ€œLinuxโ€},{โ€œcodeโ€:โ€œPF027โ€,โ€œlabelโ€:โ€œSolarisโ€},{โ€œcodeโ€:โ€œPF033โ€,โ€œlabelโ€:โ€œWindowsโ€}],โ€œVersionโ€:โ€œ8.5.5;8.5;8.0;7.0;6.1โ€,โ€œEditionโ€:โ€œโ€,โ€œLine of Businessโ€:{โ€œcodeโ€:โ€œLOB45โ€,โ€œlabelโ€:โ€œAutomationโ€}}]

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.958 High

EPSS

Percentile

99.4%