Lucene search

K
cve[email protected]CVE-2016-5933
HistoryMar 08, 2017 - 7:59 p.m.

CVE-2016-5933

2017-03-0819:59:00
CWE-254
web.nvd.nist.gov
23
ibm
tivoli monitoring
6.2
6.3
vulnerability
cve-2016-5933
http
cache poisoning
firewall bypass
host header injection
nvd

4.9 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

4.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N

5.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.3%

IBM Tivoli Monitoring 6.2 and 6.3 is vulnerable to possible host header injection attack that could lead to HTTP cache poisoning or firewall bypass. IBM Reference #: 1997223.

Affected configurations

Vulners
NVD
Node
ibm_corporationtivoli_monitoring_v6Match6.2.0
OR
ibm_corporationtivoli_monitoring_v6Match6.2.1
OR
ibm_corporationtivoli_monitoring_v6Match6.2.2
OR
ibm_corporationtivoli_monitoring_v6Match6.2.3
OR
ibm_corporationtivoli_monitoring_v6Match6.3.0
OR
ibm_corporationtivoli_monitoring_v6Match6.2.3.1
OR
ibm_corporationtivoli_monitoring_v6Match6.2.3.2
OR
ibm_corporationtivoli_monitoring_v6Match6.2.3.3
OR
ibm_corporationtivoli_monitoring_v6Match6.2.3.4
OR
ibm_corporationtivoli_monitoring_v6Match6.2.3.5
OR
ibm_corporationtivoli_monitoring_v6Match6.3
OR
ibm_corporationtivoli_monitoring_v6Match6.3.0.1
OR
ibm_corporationtivoli_monitoring_v6Match6.3.0.2
OR
ibm_corporationtivoli_monitoring_v6Match6.3.0.3
OR
ibm_corporationtivoli_monitoring_v6Match6.3.0.4
OR
ibm_corporationtivoli_monitoring_v6Match6.3.1
OR
ibm_corporationtivoli_monitoring_v6Match6.3.0.5
OR
ibm_corporationtivoli_monitoring_v6Match6.3.0.6
OR
ibm_corporationtivoli_monitoring_v6Match6.2.2.2
OR
ibm_corporationtivoli_monitoring_v6Match6.2.2.3
OR
ibm_corporationtivoli_monitoring_v6Match6.2.2.4
OR
ibm_corporationtivoli_monitoring_v6Match6.2.2.5
OR
ibm_corporationtivoli_monitoring_v6Match6.2.2.6
OR
ibm_corporationtivoli_monitoring_v6Match6.2.2.7
OR
ibm_corporationtivoli_monitoring_v6Match6.2.2.8
OR
ibm_corporationtivoli_monitoring_v6Match6.2.2.9
OR
ibm_corporationtivoli_monitoring_v6Match6.3.0.7

CNA Affected

[
  {
    "product": "Tivoli Monitoring V6",
    "vendor": "IBM Corporation",
    "versions": [
      {
        "status": "affected",
        "version": "6.2.0"
      },
      {
        "status": "affected",
        "version": "6.2.1"
      },
      {
        "status": "affected",
        "version": "6.2.2"
      },
      {
        "status": "affected",
        "version": "6.2.3"
      },
      {
        "status": "affected",
        "version": "6.3.0"
      },
      {
        "status": "affected",
        "version": "6.2.3.1"
      },
      {
        "status": "affected",
        "version": "6.2.3.2"
      },
      {
        "status": "affected",
        "version": "6.2.3.3"
      },
      {
        "status": "affected",
        "version": "6.2.3.4"
      },
      {
        "status": "affected",
        "version": "6.2.3.5"
      },
      {
        "status": "affected",
        "version": "6.3"
      },
      {
        "status": "affected",
        "version": "6.3.0.1"
      },
      {
        "status": "affected",
        "version": "6.3.0.2"
      },
      {
        "status": "affected",
        "version": "6.3.0.3"
      },
      {
        "status": "affected",
        "version": "6.3.0.4"
      },
      {
        "status": "affected",
        "version": "6.3.1"
      },
      {
        "status": "affected",
        "version": "6.3.0.5"
      },
      {
        "status": "affected",
        "version": "6.3.0.6"
      },
      {
        "status": "affected",
        "version": "6.2.2.2"
      },
      {
        "status": "affected",
        "version": "6.2.2.3"
      },
      {
        "status": "affected",
        "version": "6.2.2.4"
      },
      {
        "status": "affected",
        "version": "6.2.2.5"
      },
      {
        "status": "affected",
        "version": "6.2.2.6"
      },
      {
        "status": "affected",
        "version": "6.2.2.7"
      },
      {
        "status": "affected",
        "version": "6.2.2.8"
      },
      {
        "status": "affected",
        "version": "6.2.2.9"
      },
      {
        "status": "affected",
        "version": "6.3.0.7"
      }
    ]
  }
]

4.9 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

4.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N

5.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.3%

Related for CVE-2016-5933