Lucene search

K
ibmIBM939CF579A3478DA004C0DC63764E80A5A7E567E4CDC2FE8D1D3D9C5336892035
HistoryFeb 11, 2020 - 6:29 p.m.

Security Bulletin: Vulnerabilities found in IBM Sterling B2B Integrator and IBM Sterling File Gateway (CVE-2014-0114, CVE-2014-0927, CVE-2014-0912)

2020-02-1118:29:33
www.ibm.com
3

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Summary

IBM Sterling B2B Integrator and IBM Sterling File Gateway are affected by multiple security vulnerabilities. These vulnerabilities include:
- Open Source Apache Struts V1 ClassLoader manipulation vulnerability
- Improper Access Control
- Information Disclosure

Vulnerability Details

CVEID: CVE-2014-0114

DESCRIPTION: Apache Struts could allow a remote attacker to execute arbitrary code on the system, caused by the failure to restrict the setting of Class Loader attributes. An attacker could exploit this vulnerability using the class parameter of an ActionForm object to manipulate the ClassLoader and execute arbitrary code on the system.

CVSS Base Score: 7.5
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/92889&gt; for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVEID: CVE-2014-0927

DESCRIPTION: IBM Sterling File Gateway and IBM Sterling B2B Integrator Standard Edition allow an attacker to bypass authentication to the ActiveMQ admin user interface if they know the port number and webapp path of that interface.

CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/92259&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVEID: CVE-2014-0912

DESCRIPTION: IBM Sterling B2B Integrator Standard Edition could allow a remote attacker to obtain sensitive information. An attacker could send a specially-crafted URL request that would result in an error page that contained specific product information.

CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/92072&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Affected Products and Versions

IBM Sterling B2B Integrator 5.2 or IBM Sterling File Gateway 2.2
IBM Sterling B2B Integrator 5.1 or IBM Sterling File Gateway 2.1

Remediation/Fixes

Product

|

VRMF

|

APAR

|

Remediation/First Fix

—|—|—|—
IBM Sterling Integrator or IBM Sterling File Gateway| 5.1.x or 2.1.x| IT00301,IT00304,IT02022| Apply Generic Interim Fix 5104_4. Available on IWM
IBM Sterling B2B Integrator or IBM Sterling File Gateway| 5.2.4.2 or 2.2.4.2| IT00301,IT00304,IT02022| Apply Generic Interim Fix 5020402_3. Available on Fix Central
IBM Sterling B2B Integrator or IBM Sterling File Gateway| 5.2.X or 2.2.X| IT00301,IT00304,IT02022| Install 5020500 Media or apply 5020500 FixPack that is made available on Passport Advantage and Fix Central respectively

To acquire the fix from IWM, login to IWM.
See FAQs on downloading an iFix from the IWM site.

To acquire the fix from Fix Central, login to IBM Fix Central.

More details and release notes can be found here:
IBM Sterling B2B Integrator 5.2 Information Center

To acquire the fix from Passport Advantage, login here.

Workarounds and Mitigations

None Known.

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P