{ "id": "CVE-2008-0898", "sourceIdentifier": "cve@mitre.org", "published": "2008-02-22T21:44:00.000", "lastModified": "2011-03-08T03:05:37.970", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "The distributed queue feature in JMS in BEA WebLogic Server 9.0 through 10.0, in certain configurations, does not properly handle when a client cannot send a message to a member of a distributed queue, which allows remote authenticated users to bypass intended access restrictions for protected distributed queues." }, { "lang": "es", "value": "La caracter\u00edstica de cola distribuida en JMS de BEA WebLogic Server de 9.0 a 10.0, en ciertas configuraciones, no manipula correctamente cuando un cliente no puede enviar un mensaje a un miembro de una cola distribuida, lo que permite a usuarios autentificados remotamente evitar las restricciones de acceso previstas para colas distribuidas protegidas." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 5.8 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 4.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-264" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:bea:weblogic_server:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "3CA97F1A-49F7-4511-8959-D62155491DF5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bea:weblogic_server:9.0:ga:*:*:*:*:*:*", "matchCriteriaId": "98F632B9-0572-4563-BA41-262628A5CB7A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bea:weblogic_server:9.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E758AF8B-B47F-4CE7-B73E-3638180C9D79" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bea:weblogic_server:9.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "6AC47FAA-AB16-4728-AE0B-C0C90861D809" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bea:weblogic_server:9.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "10E284B8-4EBE-459D-87BA-401BC2AE29C5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bea:weblogic_server:9.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "5F588A56-E4CB-44A4-A4D3-BFA89D1C6BD6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bea:weblogic_server:9.0:sp5:*:*:*:*:*:*", "matchCriteriaId": "05E4CCAC-8E99-49DE-8E90-18F5C03BBC94" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bea:weblogic_server:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "DCAAE8F1-CB25-4871-BE48-ABF7DFAD8AD6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bea:weblogic_server:9.1:ga:*:*:*:*:*:*", "matchCriteriaId": "A585B339-442B-4408-9A44-E872FF4406A8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bea:weblogic_server:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "7BA8C449-ECD0-46E5-A7D6-740DE8DEE0EC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bea:weblogic_server:9.2:mp1:*:*:*:*:*:*", "matchCriteriaId": "321BC193-5FBF-4F25-996D-1FE74779F34D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bea:weblogic_server:9.2:mp2:*:*:*:*:*:*", "matchCriteriaId": "E23EB6FE-EA07-426F-9781-87630BC76FB3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:bea:weblogic_server:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "60F9ABCC-5217-4650-8C71-F8B0EB86789F" } ] } ] } ], "references": [ { "url": "http://dev2dev.bea.com/pub/advisory/268", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "http://www.securitytracker.com/id?1019447", "source": "cve@mitre.org" }, { "url": "http://www.vupen.com/english/advisories/2008/0612/references", "source": "cve@mitre.org" } ] }