Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2015-2808 CVE-2011-3389 |
CWE-ID | CWE-200 CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
WebSphere Message Broker Toolkit Other software / Other software solutions Integration Toolkit Other software / Other software solutions WebSphere Message Broker Other software / Other software solutions IBM Integration Bus Server applications / Other server solutions |
Vendor | IBM Corporation |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU90
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2015-2808
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to obtain potentially sensitive information communicated by target system.
The vulnerability exists due to access control error. A remote unauthenticated attacker can obtain RC4 encrypted data and conduct a brute-force key guessing attack by monitoring TLS network traffic.
Successful exploitation of this vulnerability may result in disclosure of system information.
Install update from vendor's website.
Vulnerable software versionsWebSphere Message Broker Toolkit: All versions
IBM Integration Bus: All versions
Integration Toolkit: before 9.0 Fix Pack 3
WebSphere Message Broker: before 7.0.0.8
CPE2.3https://www.ibm.com/support/pages/node/262111
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU33689
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2011-3389
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsWebSphere Message Broker Toolkit: All versions
IBM Integration Bus: All versions
Integration Toolkit: before 9.0 Fix Pack 3
WebSphere Message Broker: before 7.0.0.8
CPE2.3https://www.ibm.com/support/pages/node/262111
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.