Lucene search

K
ibmIBMD3960A5391CDBC3EFE71D2AF6765F7AAC5104A881ACFC37A5D48C02CA2E26DF0
HistoryJun 16, 2018 - 8:08 p.m.

Security Bulletin: IBM Sterling Order Management is affected by Apache Struts 2 security vulnerabilities (CVE-2016-3093 , CVE-2016-4436)

2018-06-1620:08:21
www.ibm.com
12

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Summary

IBM Sterling Order Management uses Apache Struts 2 and is affected by some of the vulnerabilities that exist in Apache Struts 2

Vulnerability Details

CVEID: CVE-2016-3093 DESCRIPTION: Apache Struts is vulnerable to a denial of service, caused by the improper implementation of cache used to store method references by the OGNL expression language. An attacker could exploit this vulnerability to block access to a Web site.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/113686 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2016-4436 DESCRIPTION: An unspecified error Apache Struts related to the method used to clean up action name has an unknown impact and attack vector.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/114183 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

Affected Products and Versions

IBM Sterling Selling and Fulfillment Foundation 9.1.0
IBM Sterling Selling and Fulfillment Foundation 9.2.0
IBM Sterling Selling and Fulfillment Foundation 9.2.1
IBM Sterling Selling and Fulfillment Foundation 9.3.0
IBM Sterling Selling and Fulfillment Foundation 9.4.0
IBM Sterling Selling and Fulfillment Foundation 9.5.0

Remediation/Fixes

The recommended solution is to apply the security fix pack (SFP) as soon as practical. Please see below for information about the available fixes.

Product _Security Fix Pack_* Remediation/First Fix
IBM Sterling Selling and Fulfillment Foundation 9.5.0 9.5.0-SFP1 http://www-933.ibm.com/support/fixcentral/options

Select appropriate VRMF
IBM Sterling Selling and Fulfillment Foundation 9.4.0| 9.4.0-SFP2| http://www-933.ibm.com/support/fixcentral/options

Select appropriate VRMF
IBM Sterling Selling and Fulfillment Foundation 9.3.0| 9.3.0-SFP4| http://www-933.ibm.com/support/fixcentral/options

Select appropriate VRMF
IBM Sterling Selling and Fulfillment Foundation 9.2.1| 9.2.1- SFP5| http://www-933.ibm.com/support/fixcentral/options

_Select appropriate VRMF _
IBM Sterling Selling and Fulfillment Foundation 9.2.0| 9.2.0- SFP5| http://www-933.ibm.com/support/fixcentral/options

_Select appropriate VRMF _
IBM Sterling Selling and Fulfillment Foundation 9.1.0| 9.1.0- SFP5| http://www-933.ibm.com/support/fixcentral/options

_Select appropriate VRMF _

Workarounds and Mitigations

None

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Related for D3960A5391CDBC3EFE71D2AF6765F7AAC5104A881ACFC37A5D48C02CA2E26DF0