ID CVE-2012-3330
Summary The proxy server in IBM WebSphere Application Server 7.0 before 7.0.0.27, 8.0 before 8.0.0.5, and 8.5 before 8.5.0.1, and WebSphere Virtual Enterprise, allows remote attackers to cause a denial of service (daemon outage) via a crafted request.
References
Vulnerable Configurations
  • cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:7.0.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:7.0.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:7.0.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:7.0.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:7.0.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:7.0.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:7.0.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:7.0.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:7.0.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:7.0.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:7.0.0.15:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.15:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:7.0.0.17:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.17:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:7.0.0.19:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.19:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:7.0.0.21:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.21:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:7.0.0.23:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.23:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:7.0.0.25:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.25:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:8.0.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:8.0.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:8.0.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:8.0.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:8.0.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:8.0.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:8.0.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:8.0.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:8.0.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:8.0.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 29-08-2017 - 01:31)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
aixapar PM71319
confirm http://www.ibm.com/support/docview.wss?uid=swg21614265
xf was-proxy-dos(78047)
Last major update 29-08-2017 - 01:31
Published 14-11-2012 - 12:30
Last modified 29-08-2017 - 01:31
Back to Top