Security Bulletin: IBM Sterling Control Center has various vulnerabilities (CVE-2013-2968 and CVE-2013-2969)

Flash (Alert)


IBM Sterling Control Center has various Denial-of-Service (DOS) and Cross Site Scripting (XSS) vulnerabilities.


CVE ID: CVE-2013-2968

DESCRIPTION: - Denial of Service
IBM Sterling Control Center (SCC) uses a buffer read method which can potentially result in a Denial of Service (DoS) if a user causes SCC to read a file and the file is large and has no EOL characters.

CVSS Base Score: 6.3
CVSS Temporal Score: See for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/AU:S/C:N/I:N/A:C)

CVE ID: CVE-2013-2969

DESCRIPTION: - Cross Site Scripting
IBM Sterling Control Center allows some invalid characters to be returned to the user, whereby a cross-site scripting (XSS) attack could occur. When a web application uses input from a user in the output it generates without filtering it, an attacker can insert an attack in that input and the web application sends the attack to other users.

CVSS Base Score: 3.5
CVSS Temporal Score: See for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/AU:S/C:N/I:P/A:N)

IBM Sterling Control Center 5.4 through
IBM Sterling Control Center 5.3 through
IBM Sterling Control Center 5.2 through


The recommended solution is to upgrade to the current release as soon as practical. Please see below for information about the fixes available.

Fix* VRMF APAR How to acquire fix
iFix 1 N/A IBM Sterling Control Center available on Fix Central N/A IBM Sterling Control Center available on IBM Fix Central N/A Control Center 5.2.09 is now available on IWM

· Complete CVSS Guide
· On-line Calculator V2
· CVE-2013-2968
· X-Force Vulnerability Database
· CVE-2013-2969
· X-Force Vulnerability Database

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

11 June 2013 Original Copy Published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.

Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Rate this page:

(0 users)Average rating

Document information

More support for:

IBM Control Center

Software version:

5.2, 5.3, 5.4,

Operating system(s):

AIX, HP-UX, Linux, Solaris, Windows

Reference #:


Modified date:


Translate my page

Machine Translation

Content navigation