René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

127 lines
4.7 KiB
JSON

{
"id": "CVE-2014-3051",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2014-10-29T10:55:03.430",
"lastModified": "2017-08-29T01:34:36.843",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The Internet Service Monitor (ISM) agent in IBM Tivoli Composite Application Manager (ITCAM) for Transactions 7.1 and 7.2 before 7.2.0.3 IF28, 7.3 before 7.3.0.1 IF30, and 7.4 before 7.4.0.0 IF18 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain credential information via a crafted certificate."
},
{
"lang": "es",
"value": "El agente Internet Service Monitor (ISM) en IBM Tivoli Composite Application Manager (ITCAM) for Transactions 7.1 y 7.2 anterior a 7.2.0.3 IF28, 7.3 anterior a 7.3.0.1 IF30, y 7.4 anterior a 7.4.0.0 IF18 no verifica los certificados X.509 de los servidores SSL, lo que permite a atacantes man-in-the-middle suplantar servidores y obtener informaci\u00f3n sensible a trav\u00e9s de un certificado manipulado."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-310"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_composite_application_manager_for_transactions:7.1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4308186-19E0-4988-B487-53E2CE0462F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_composite_application_manager_for_transactions:7.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BD67DE18-0AFF-448C-BC6E-1D90D31EE240"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_composite_application_manager_for_transactions:7.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DE913F12-B84B-43CA-A662-FC96FB4EAE0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_composite_application_manager_for_transactions:7.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E806A82D-5F71-4353-9253-8748A3BA0BCF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_composite_application_manager_for_transactions:7.1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9938CD67-A295-453F-B741-B394F32CBB60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_composite_application_manager_for_transactions:7.2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C8E0C397-7BB5-4498-8B24-61ADDC4C4516"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_composite_application_manager_for_transactions:7.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A7D1B1D0-55FA-4D7D-8B7C-1BE2B82D5171"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_composite_application_manager_for_transactions:7.2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "99F06AF6-4826-44D3-80A5-39D29082941F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_composite_application_manager_for_transactions:7.3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "63DAC069-2C10-486A-91E7-54F0E307EF9C"
}
]
}
]
}
],
"references": [
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682290",
"source": "psirt@us.ibm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93444",
"source": "psirt@us.ibm.com"
}
]
}