Lucene search

K
ibmIBMA2B499896A07C1A6B5EDF9670C15A166472959105FD29E24EF4CE9EEB47B6267
HistoryJun 17, 2018 - 3:39 p.m.

Security Bulletin: OpenSource Python Vulnerablities affect IBM Tivoli Application Dependency Discovery Manager (TADDM) (CVE-2016-5699, CVE-2016-5636)

2018-06-1715:39:52
www.ibm.com
110

0.028 Low

EPSS

Percentile

90.6%

Summary

Vulnerabilities in Open Source Python affect IBM Tivoli Application Dependency Discovery Manager

Vulnerability Details

CVEID: CVE-2016-5699**
DESCRIPTION:** urllib2 and urllib for Python are vulnerable to HTTP header injection, caused by improper validation of input. By persuading a victim to visit a specially-crafted Web page, a remote attacker could exploit this vulnerability to inject arbitrary HTTP headers, which will allow the attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking.
CVSS Base Score: 6.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/114200 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVEID: CVE-2016-5636**
DESCRIPTION:** zipimport module for Python is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by the get_data() function in zipimport.c. A remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
CVSS Base Score: 7.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/114309 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

Affected Products and Versions

TADDM 7.2.2.0 - 7.2.2.5
TADDM 7.3.0.0 - 7.3.0.3

Remediation/Fixes

There are eFixes prepared on top of the latest released FixPack for each stream:

Fix VRMF APAR How to acquire fix
efix_TADDM73_jython21_FP320160323.zip 7.3.0.3 None Download eFix
efix_TADDM722_jython21_FP520160209.zip 7.2.2.5
None Download eFix

Please get familiar with eFix readme in etc/<efix_name>_readme.txt

Workarounds and Mitigations

None