Lucene search

K
ibmIBME9FB884C0B8550BFF9F65A6E107B4B2A04340A9F8E97F0DD30010C5273F15EB9
HistoryJan 31, 2019 - 1:35 a.m.

Security Bulletin: Two vulnerabilities fixed in recent IBM ServerGuide, UXSPI and ToolsCenter Suite release (CVE-2014-4244, CVE-2104-4835)

2019-01-3101:35:01
www.ibm.com
16

EPSS

0.009

Percentile

82.5%

Summary

IBM ToolsCenter Suite is affected by one vulnerability in Java, while IBM ServerGuide, UXSPI and ToolsCenter Suite are all affected by an additional vulnerability.

Vulnerability Details

Abstract

IBM ToolsCenter Suite is affected by one vulnerability in Java, while IBM ServerGuide, UXSPI and ToolsCenter Suite are all affected by an additional vulnerability.

Content

Vulnerability Details:

CVE-ID: CVE-2014-4244

Description: An unspecified vulnerability in IBM ToolsCenter Suite related to the Security component has partial confidentiality impact, partial integrity impact, and no availability impact.

CVSS Base Score: 4
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/94605&gt; for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N)

CVE-ID: CVE-2014-4835

Description: A vulnerability in IBM ServerGuide, UXSPI and ToolsCenter Suite could allow a local user to obtain sensitive information from log files, including in some cases, IMM usernames and passwords.

CVSS Base Score: 2.1
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/95629&gt; for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:N/A:N)

Affected products and versions

  • IBM ServerGuide versions 9.61 and earlier
  • IBM UpdateXpress System Packs Installer (UXSPI) versions 9.61 and earlier
  • IBM ToolsCenter Suite versions 9.61 and earlier

Remediation/Fixes:

To remedy both vulnerabilities, IBM recommends updating to all three of the versions below, available here.

  • IBM ServerGuide versions 9.63 or later
  • IBM UpdateXpress System Packs Installer (UXSPI) versions 9.63 or later
  • IBM ToolsCenter Suite versions 9.63 or later

Workaround(s) & Mitigation(s):

None