9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
Apache Xerces-C XML Parser library is vulnerable to a denial of service, caused by improper bounds checking during processing and error reporting. By sending specially crafted input documents, an attacker could exploit this vulnerability to cause the library to crash or possibly execute arbitrary code on the system.
CVEID: CVE-2016-0729
DESCRIPTION: Apache Xerces-C XML Parser library is vulnerable to a denial of service, caused by improper bounds checking during processing and error reporting. By sending specially crafted input documents, an attacker could exploit this vulnerability to cause the library to crash or possibly execute arbitrary code on the system.
CVSS Base Score: 7.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/111028> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
IBM Monitoring 8.1.2 and 8.1.3
IBM Application Diagnostics 8.1.2 and 8.1.3
IBM Application Performance Management 8.1.2 and 8.1.3
IBM Application Performance Management Advanced 8.1.2 and 8.1.3
IBM Performance Management on Cloud
Agent| Product
VRMF| Remediation
—|—|—
Monitoring Agent for DataPower Appliance
Monitoring Agent for IBM Integration Bus
Monitoring Agent for IBM MQ
Monitoring Agent for Microsoft .NET
Monitoring Agent for WebSphere Applications | 8.1.3, Cloud
_ _
_ _
8.1.2| If you use any of these agents, the vulnerability can be remediated by applying the Core Framework patch to all systems where the agents are installed:
https://www-01.ibm.com/support/docview.wss?rs=0&uid=isg400002820
https://www-01.ibm.com/support/docview.wss?rs=0&uid=isg400002814
Response Time Monitoring Agent| 8.1.3, Cloud
_ _
_ _
8.1.2| If you use the Response Time Monitoring Agent, the vulnerability can be remediated by applying the Response Time Monitoring Agent patch to all systems where this agent is installed:
https://www-01.ibm.com/support/docview.wss?rs=0&uid=isg400002815
https://www-01.ibm.com/support/docview.wss?rs=0&uid=isg400002813
CPE | Name | Operator | Version |
---|---|---|---|
tivoli monitoring | eq | 8.1.2 | |
tivoli monitoring | eq | 8.1.3 |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P