ID CVE-2014-0869
Summary The decrypt function in RICOS in IBM Algo Credit Limits (aka ACLM) 4.5.0 through 4.7.0 before 4.7.0.03 FP5 in IBM Algorithmics does not require a key, which makes it easier for remote attackers to obtain cleartext passwords by sniffing the network and then providing a string argument to this function.
References
Vulnerable Configurations
  • cpe:2.3:a:ibm:algo_credit_limits:4.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:algo_credit_limits:4.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:algo_credit_limits:4.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:algo_credit_limits:4.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:algorithmics:-:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:algorithmics:-:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 09-10-2018 - 19:42)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:N/A:N
refmap via4
bugtraq 20140630 SEC Consult SA-20140630-0 :: Multiple vulnerabilities in IBM Algorithmics RICOS
confirm http://www-01.ibm.com/support/docview.wss?uid=swg21675881
fulldisc 20140630 SEC Consult SA-20140630-0 :: Multiple vulnerabilities in IBM Algorithmics RICOS
misc
xf ibm-aclm-cve20140869-decrypt(90943)
Last major update 09-10-2018 - 19:42
Published 07-07-2014 - 11:01
Last modified 09-10-2018 - 19:42
Back to Top