Lucene search

K
ibmIBM9BE1D889C1BD77682655EB00AA0EE21AA5C7CCAA1F93287BB788D1CFC12BBD77
HistoryJun 29, 2018 - 10:08 a.m.

Security Bulletin: A security vulnerability has been identified in the WebSphere Application Server where the Rational Asset Manager is deployed. (CVE-2016-1000031)

2018-06-2910:08:28
www.ibm.com
4

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Summary

In the WebSphere Application Server (WAS) where the Rational Asset Manager(RAM) is deployed, a potential vulnerability in the Apache Commons FileUpload is identified. Information about this security vulnerability affecting WebSphere Application Server has been published in a security bulletin.

Vulnerability Details

Refer to the Remediation/Fixes section.

Affected Products and Versions

Rational Asset Manager 7.5.3.2 and earlier.

Remediation/Fixes

The remediation is applicable for both Rational Asset Manager and WebSphere Application Server (WAS).

For applying fix on WAS, refer to the security bulletin specified in the following table for information about fixes.

Affected Supporting Product |

Affected Supporting Product Security Bulletin
—|—

IBM WebSphere Application Server Version 8.0, 8.5 and 8.5.5 |

Security Bulletin: Security vulnerability in Apache Commons FileUpload used by WebSphere Application Server (CVE-2016-1000031)

For applying fix on RAM, upgrade to Rational Asset Manager 7.5.3.3 or**Download theiFix **as specified in the following table. Version Fix
Rational Asset Manager 7.5.2.4 Rational Asset Manager 7.5.2.4 iFix Download.

NOTE: For support on other Rational Asset Manager versions, please contact IBM support.

Workarounds and Mitigations

None.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P