Lucene search

K
ibmIBM9D0FFD86CD62C138CAA1B8F14847D57099916F395CC9116CF3A2C3451A5AB185
HistoryJun 17, 2018 - 4:36 a.m.

Security Bulletin: Rational ClearQuest CQOle ActiveX Control Remote Execution Vulnerability (CVE-2012-0708)

2018-06-1704:36:55
www.ibm.com
25

0.953 High

EPSS

Percentile

99.4%

Summary

A defect has been discovered where an IBM Rational ClearQuest Ole API function can be called with incorrect parameters causing a crash or possible execution of attack code.

Vulnerability Details

| Subscribe to My Notifications to be notified of important product support alerts like this.

  • Follow this link for more information (requires login with your IBM ID)
    β€”|β€”

CVE ID: CVE-2012-0708

Description: A defect has been discovered where a ClearQuest Ole API function can be called with incorrect parameters causing a crash or possible execution of attack code. All versions of ClearQuest are affected. This affects only Windows platforms.

In order to be affected, the machine must have ClearQuest .dll files installed. These files are installed on a Microsoft Windows machine if any of the components of the ClearQuest installation are installed on a machine. This includes the following:

  • ClearQuest Client (Eclipse-based)
  • ClearQuest Client for Windows (Microsoft MFC-based)
  • ClearQuest Web Server or server components

Machines which do not have any ClearQuest .dll files installed on them are not impacted. This includes using a browser to run the ClearQuest Web Client. The ClearQuest Web Server is the machine that has the .dll files installed on them. The machine running the browser which accesses the ClearQuest Web Server is not impacted, unless that browser’s machine also has run a ClearQuest product installation and installed any ClearQuest components on that machine.

CVSS Base Score: 9.3 **CVSS Temporal Score:**See <https://exchange.xforce.ibmcloud.com/vulnerabilities/73492&gt; for the current score *CVSS Environmental Score:**Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)

Affected Products and Versions

Any supported Microsoft Windows platform.

Remediation/Fixes

Upgrade to one of the following releases:

Workarounds and Mitigations

Workaround:

This vulnerability does not exist on UNIX or Linux platforms.

Mitigation:

Do not run untrusted applications on the machine.

Configure browsers to not allow ActiveX controls to run.

0.953 High

EPSS

Percentile

99.4%

Related for 9D0FFD86CD62C138CAA1B8F14847D57099916F395CC9116CF3A2C3451A5AB185