ID CVE-2017-1612
Summary IBM WebSphere MQ 7.0, 7.1, 7.5, 8.0, and 9.0 service trace module could be used to execute untrusted code under 'mqm' user. IBM X-Force ID: 132953.
References
Vulnerable Configurations
  • cpe:2.3:a:ibm:websphere_mq:7.5:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.5.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.5.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.5.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.5.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.5.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.5.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.5.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.5.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.5.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.5.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.5.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.5.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.5.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.5.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.5.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.5.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.0.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.0.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.0.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.0.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.0.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.0.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.0.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.0.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.0.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.0.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.0.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.0.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.0.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.0.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.0.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.0.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.0.1.8:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.0.1.8:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.0.1.9:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.0.1.9:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.0.1.10:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.0.1.10:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.0.1.11:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.0.1.11:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.0.1.12:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.0.1.12:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.0.1.13:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.0.1.13:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.0.1.14:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.0.1.14:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:7.1.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:7.1.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:8.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:8.0.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:8.0.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:8.0.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:8.0.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:8.0.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:8.0.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:8.0.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:8.0.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:8.0.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:8.0.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:8.0.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:8.0.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:8.0.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:8.0.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:9.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:9.0.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:9.0.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:9.0.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:9.0.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:9.0.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:9.0.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:websphere_mq:9.0.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:websphere_mq:9.0.3.0:*:*:*:*:*:*:*
CVSS
Base: 4.6 (as of 03-10-2019 - 00:03)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 102479
confirm http://www.ibm.com/support/docview.wss?uid=swg22009918
misc https://exchange.xforce.ibmcloud.com/vulnerabilities/132953
sectrack 1040175
Last major update 03-10-2019 - 00:03
Published 09-01-2018 - 20:29
Last modified 03-10-2019 - 00:03
Back to Top