CERTA-2009-AVI-408
Vulnerability from certfr_avis

De multiples vulnérabilités permettant d'accéder à des données sensibles ou de réaliser un déni de service ont été découvertes dans le serveur Internet IBM HTTP Server.

Description

De nombreuses vulnérabilités ont été découvertes dans le serveur IBM HTTP Server. L'exploitation de ces vulnérabilités permet d'accéder à des informations sensibles ou de réaliser un déni de service à distance.

L'éditeur n'a pas fourni plus d'informations sur l'exploitation de ces vulnérabilités.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
IBM N/A IBM HTTP Server versions 6.1.x ;
IBM N/A IBM HTTP Server versions 6.0.x ;
IBM N/A IBM HTTP Server versions 7.0.x ;

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "IBM HTTP Server versions 6.1.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM HTTP Server versions 6.0.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM HTTP Server versions 7.0.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nDe nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le serveur IBM\nHTTP Server. L\u0027exploitation de ces vuln\u00e9rabilit\u00e9s permet d\u0027acc\u00e9der \u00e0 des\ninformations sensibles ou de r\u00e9aliser un d\u00e9ni de service \u00e0 distance.\n\nL\u0027\u00e9diteur n\u0027a pas fourni plus d\u0027informations sur l\u0027exploitation de ces\nvuln\u00e9rabilit\u00e9s.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2009-1890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1890"
    },
    {
      "name": "CVE-2009-1891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1891"
    },
    {
      "name": "CVE-2009-0023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0023"
    },
    {
      "name": "CVE-2009-1956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1956"
    },
    {
      "name": "CVE-2009-1955",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1955"
    }
  ],
  "initial_release_date": "2009-09-25T00:00:00",
  "last_revision_date": "2009-09-25T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 IBM swg24023947 du 08 septembre 2009 :",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24023947"
    }
  ],
  "reference": "CERTA-2009-AVI-408",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2009-09-25T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s permettant d\u0027acc\u00e9der \u00e0 des donn\u00e9es sensibles\nou de r\u00e9aliser un d\u00e9ni de service ont \u00e9t\u00e9 d\u00e9couvertes dans le serveur\nInternet IBM HTTP Server.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM HTTP Server",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 4023947 du 08 septembre 2009",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…