Security Bulletin: Security vulnerabilities have been identified in IBM WebSphere Application Server shipped with IBM WebSphere Portal
IBM WebSphere Application Server is shipped as a component of IBM WebSphere Portal. Information about security vulnerabilities affecting IBM WebSphere Application Server has been published in security bulletins.
Please consult the security bulletins for IBM WebSphere Application Server published at
- Security Bulletin: Multiple vulnerabilities fixed in IBM HTTP Server (APAR PI22070)
- Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect WebSphere Application Server July 2014 CPU
- Security Bulletin: Potential Security Vulnerabilities fixed in IBM WebSphere Application Server 18.104.22.168
- Security Bulletin: Java.policy file change in Default Socket Permissions for WebSphere Application Server
- Security Bulletin: Potential Security Vulnerabilities fixed in IBM WebSphere Application Server 22.214.171.124
- Security Bulletin: Multiple vulnerabilities in current IBM SDK for Java for WebSphere Application Server April 2014 CPU
- Security Bulletin: Potential Security Vulnerabilities fixed in IBM WebSphere Application Server 126.96.36.199
- Security Bulletin: Potential Security exposure with WebSphere Application Server (CVE-2014-3070)
- Security Bulletin: Potential Security vulnerability in IBM HTTP Server CVE-2013-6747
- Security Bulletin: Classloader Manipulation Vulnerability in IBM WebSphere Application Server CVE-2014-0114
- Security Bulletin: Potential Security Vulnerabilities fixed in IBM WebSphere Application Server 188.8.131.52
Affected Products and Versions
|Principal Product and Version(s)||Affected Supporting Product and Version|
|IBM WebSphere Portal version 6.1, 7.0, 8.0, and 8.5||IBM WebSphere Application Server version 6.1, 7.0, 8.0, 8.5|
Get Notified about Future Security Bulletins
IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.
2 September 2014: Original Copy Published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
More support for:
Software version: 6.1, 7.0, 8.0, 8.5
Operating system(s): AIX, HP-UX, IBM i, Linux, Solaris, Windows, z/OS
Reference #: 1682346
Modified date: 12 November 2014
Translate this page: