VID |
22748 |
Severity |
30 |
Port |
8880, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
IBM WebSphere Application Server 8.5 prior to Fix Pack 11 is running on the remote host. It is, therefore, affected by the following vulnerabilities :
- A remote code execution vulnerability exists due to improper sanitization user-supplied input when deserializing Java objects. An authenticated, remote attacker can exploit this, via a crafted serialized object, to execute arbitrary Java code. (CVE-2016-5983)
- An information disclosure vulnerability exists due to improper handling of responses. An unauthenticated, remote attacker can exploit this to disclose sensitive server identification information. (CVE-2016-5986)
* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://www-01.ibm.com/support/docview.wss?uid=swg21990056 http://www-01.ibm.com/support/docview.wss?uid=swg21990060
* Platforms Affected: IBM WebSphere Application Server versions 8.5 prior to 8.5 Fix Pack 11 |
Recommendation |
Upgrade to the latest version of IBM WebSphere Application Server 8.5.5.11 or later, available from the IBM Support & downloads Web site at http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg27004980#ver85_0 Alternatively, apply Interim Fixes PI67093 and PI70737 at http://www-01.ibm.com/support/docview.wss?uid=swg21990056 and http://www-01.ibm.com/support/docview.wss?uid=swg21990060 |
Related URL |
CVE-2016-5983,CVE-2016-5986 (CVE) |
Related URL |
93013,93162 (SecurityFocus) |
Related URL |
(ISS) |
|