Korean
<< Back
VID 22748
Severity 30
Port 8880, ...
Protocol TCP
Class WWW
Detailed Description IBM WebSphere Application Server 8.5 prior to Fix Pack 11 is running on the remote host. It is, therefore, affected by the following vulnerabilities :

- A remote code execution vulnerability exists due to improper sanitization user-supplied input when deserializing Java objects. An authenticated, remote attacker can exploit this, via a crafted serialized object, to execute arbitrary Java code. (CVE-2016-5983)

- An information disclosure vulnerability exists due to improper handling of responses. An unauthenticated, remote attacker can exploit this to disclose sensitive server identification information. (CVE-2016-5986)

* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://www-01.ibm.com/support/docview.wss?uid=swg21990056
http://www-01.ibm.com/support/docview.wss?uid=swg21990060

* Platforms Affected:
IBM WebSphere Application Server versions 8.5 prior to 8.5 Fix Pack 11
Recommendation Upgrade to the latest version of IBM WebSphere Application Server 8.5.5.11 or later, available from the IBM Support & downloads Web site at http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg27004980#ver85_0 Alternatively, apply Interim Fixes PI67093 and PI70737 at http://www-01.ibm.com/support/docview.wss?uid=swg21990056 and http://www-01.ibm.com/support/docview.wss?uid=swg21990060
Related URL CVE-2016-5983,CVE-2016-5986 (CVE)
Related URL 93013,93162 (SecurityFocus)
Related URL (ISS)