Thursday, March 2, 2017

IBM Security Bulletin: IBM Maximo Asset Management could allow a local attacker to obtain sensitive information using HTTP Header Injection (CVE-2017-1124)

IBM Maximo Asset Management could allow a local attacker to obtain sensitive information using HTTP Header Injection.

CVE(s): CVE-2017-1124

Affected product(s) and affected version(s):

This vulnerability affects the following versions of the IBM Maximo Asset Management core product, and all other IBM Maximo Industry Solution and IBM Control Desk products, regardless of their own version, if they are currently installed on top of an affected IBM Maximo Asset Management. *

Maximo Asset Management core product affected versions:
Maximo Asset Management 7.6, 7.5, 7.1
Maximo Asset Management Essentials

Industry Solutions products affected if using an affected core version:
Maximo for Aviation
Maximo for Government
Maximo for Life Sciences
Maximo for Nuclear Power
Maximo for Oil and Gas
Maximo for Transportation
Maximo for Utilities

IBM Control Desk products affected if using an affected core version:
IBM Control Desk
SmartCloud Control Desk
Tivoli Asset Management for IT
Tivoli Integration Composer
Tivoli Service Request Manager
Tivoli Change and Configuration Management Database

* To determine the core product version, log in and view System Information. The core product version is the “Tivoli’s process automation engine” version. Please consult the Product Coexistence Matrix for a list of supported product combinations.

Refer to the following reference URLs for remediation and additional vulnerability details:
Source Bulletin: http://ift.tt/2miK2UP
X-Force Database: http://ift.tt/2mPbsOO

The post IBM Security Bulletin: IBM Maximo Asset Management could allow a local attacker to obtain sensitive information using HTTP Header Injection (CVE-2017-1124) appeared first on IBM PSIRT Blog.



from IBM Product Security Incident Response Team http://ift.tt/2miq2C0

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.