Lucene search

K
ibmIBMB12E1480C95C9CAAB1F7663E6F0D603F2213265AF775D11E75401A3FE9C7C6F9
HistoryJun 17, 2018 - 3:27 p.m.

Security Bulletin: A vulnerability in Apache Xerces-C XML Parser library affects IBM Performance Management products (CVE-2016-0729 )

2018-06-1715:27:47
www.ibm.com
5

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Summary

Apache Xerces-C XML Parser library is vulnerable to a denial of service, caused by improper bounds checking during processing and error reporting. By sending specially crafted input documents, an attacker could exploit this vulnerability to cause the library to crash or possibly execute arbitrary code on the system.

Vulnerability Details

CVEID: CVE-2016-0729
DESCRIPTION: Apache Xerces-C XML Parser library is vulnerable to a denial of service, caused by improper bounds checking during processing and error reporting. By sending specially crafted input documents, an attacker could exploit this vulnerability to cause the library to crash or possibly execute arbitrary code on the system.
CVSS Base Score: 7.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/111028&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

Affected Products and Versions

IBM Monitoring 8.1.2 and 8.1.3

IBM Application Diagnostics 8.1.2 and 8.1.3

IBM Application Performance Management 8.1.2 and 8.1.3

IBM Application Performance Management Advanced 8.1.2 and 8.1.3

IBM Performance Management on Cloud

Remediation/Fixes

Agent| Product
VRMF| Remediation
—|—|—
Monitoring Agent for DataPower Appliance
Monitoring Agent for IBM Integration Bus
Monitoring Agent for IBM MQ
Monitoring Agent for Microsoft .NET
Monitoring Agent for WebSphere Applications | 8.1.3, Cloud

_ _
_ _
8.1.2| If you use any of these agents, the vulnerability can be remediated by applying the Core Framework patch to all systems where the agents are installed:

https://www-01.ibm.com/support/docview.wss?rs=0&uid=isg400002820

https://www-01.ibm.com/support/docview.wss?rs=0&uid=isg400002814
Response Time Monitoring Agent| 8.1.3, Cloud
_ _
_ _
8.1.2| If you use the Response Time Monitoring Agent, the vulnerability can be remediated by applying the Response Time Monitoring Agent patch to all systems where this agent is installed:
https://www-01.ibm.com/support/docview.wss?rs=0&uid=isg400002815

https://www-01.ibm.com/support/docview.wss?rs=0&uid=isg400002813

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P