News
Abstract
IBM Sterling Control Center has various Denial-of-Service (DOS) and Cross Site Scripting (XSS) vulnerabilities.
Content
VULNERABILITY DETAILS:
CVE ID: CVE-2013-2968
DESCRIPTION: - Denial of Service
IBM Sterling Control Center (SCC) uses a buffer read method which can potentially result in a Denial of Service (DoS) if a user causes SCC to read a file and the file is large and has no EOL characters.
CVSS Base Score: 6.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/83859 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/AU:S/C:N/I:N/A:C)
CVE ID: CVE-2013-2969
DESCRIPTION: - Cross Site Scripting
IBM Sterling Control Center allows some invalid characters to be returned to the user, whereby a cross-site scripting (XSS) attack could occur. When a web application uses input from a user in the output it generates without filtering it, an attacker can insert an attack in that input and the web application sends the attack to other users.
CVSS Base Score: 3.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/83860 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/AU:S/C:N/I:P/A:N)
AFFECTED PRODUCTS AND VERSIONS:
IBM Sterling Control Center 5.4 through 5.4.0.1
IBM Sterling Control Center 5.3 through 5.3.0.3
IBM Sterling Control Center 5.2 through 5.2.0.8
REMEDIATION:
The recommended solution is to upgrade to the current release as soon as practical. Please see below for information about the fixes available.
Fix* | VRMF | APAR | How to acquire fix |
iFix 1 | 5.4.0.1 | N/A | IBM Sterling Control Center 5.4.0.1 available on Fix Central |
5.3.0.4 | N/A | IBM Sterling Control Center 5.3.0.4 available on IBM Fix Central | |
5.2.0.9 | N/A | Control Center 5.2.09 is now available on IWM |
REFERENCES:
· Complete CVSS Guide
· On-line Calculator V2
· CVE-2013-2968
· X-Force Vulnerability Database
· CVE-2013-2969
· X-Force Vulnerability Database
RELATED INFORMATION:
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
CHANGE HISTORY
11 June 2013 Original Copy Published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.
Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
Was this topic helpful?
Document Information
Modified date:
25 September 2022
UID
swg21640348