2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2015-1943" ,
"sourceIdentifier" : "psirt@us.ibm.com" ,
"published" : "2015-09-14T22:59:00.103" ,
2025-04-12 12:06:01 +00:00
"lastModified" : "2025-04-12T10:46:40.837" ,
"vulnStatus" : "Deferred" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "IBM WebSphere Portal 6.1.0.x through 6.1.0.6 CF27, 6.1.5.x through 6.1.5.3 CF27, 7.0.x through 7.0.0.2 CF29, 8.0.x before 8.0.0.1 CF17, and 8.5.0 before CF06 allows remote attackers to cause a denial of service (CPU and memory consumption) via a crafted request."
} ,
{
"lang" : "es" ,
"value" : "Vulnerabilidad en IBM WebSphere Portal 6.1.0.x hasta la versi\u00f3n 6.1.0.6 CF27, 6.1.5.x hasta la versi\u00f3n 6.1.5.3 CF27, 7.0.x hasta la versi\u00f3n 7.0.0.2 CF29, 8.0.x en versiones anteriores a 8.0.0.1 CF17 y 8.5.0 en versiones anteriores a CF06, permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria y CPU) a trav\u00e9s de una petici\u00f3n manipulada."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:C" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-399"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:websphere_portal:6.1.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E618064A-3D05-4DC6-9A47-0EDF2427642F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:websphere_portal:6.1.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3DE74154-3E79-4D56-96C4-D8E644F1419D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:websphere_portal:6.1.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FA915826-5D89-43E9-83E7-88973648302A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:websphere_portal:6.1.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C5DB29F4-59AB-439C-91C4-CDF677676C26"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:websphere_portal:6.1.0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9D6CA922-11EF-4315-A09A-B4A8937E4CF4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:websphere_portal:6.1.0.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "526738D7-1AF8-4A8F-B833-BA0E35973A3E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:websphere_portal:6.1.0.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "13D6BE9C-16FD-4FB4-8A87-56B42C246316"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:websphere_portal:6.1.5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3F1964FC-672F-4139-938F-A8EF9D86D9C2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:websphere_portal:6.1.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C5B50CEA-AFC4-4B45-9954-519965237FC3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:websphere_portal:6.1.5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0902AC0F-EA4D-4E65-A70A-15DE9B904B35"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:websphere_portal:6.1.5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D808F95D-C6BD-43EB-B16C-66449977BCFE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:websphere_portal:7.0.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D303B0B9-CDAB-409B-AE44-512D4791C36F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:websphere_portal:7.0.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C6ECEE98-B276-4ED6-AA5A-109EA57E9925"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:websphere_portal:7.0.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9E4FF84B-A17F-464B-A718-67C44D2C69BC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:websphere_portal:8.0.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C90EF7A4-8181-42C3-BB95-395D0DD94C14"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:websphere_portal:8.0.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1F40E0F5-B964-4BDC-828E-7571619F7C5B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:websphere_portal:8.5.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D03AF20E-0C29-45A6-9B7F-8260D8D9E8BF"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PI39617" ,
"source" : "psirt@us.ibm.com"
} ,
{
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21962567" ,
"source" : "psirt@us.ibm.com" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securitytracker.com/id/1033444" ,
"source" : "psirt@us.ibm.com"
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PI39617" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21962567" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securitytracker.com/id/1033444" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}