CNVD-2016-11638

Vulnerability from cnvd - Published: 2016-11-30
VLAI Severity ?
Title
多款IBM产品本地信息泄露漏洞
Description
IBM Cloud Orchestrator是美国IBM公司的一套为IT服务提供云管理、加快软件与基础架构交付的解决方案。IBM SmartCloud Orchestrator是IBM云产品家族中的一个新产品。 多款IBM产品存在信息泄露漏洞。允许攻击者可以利用漏洞获取敏感信息。
Severity
Patch Name
多款IBM产品本地信息泄露漏洞的补丁
Patch Description
IBM Cloud Orchestrator是美国IBM公司的一套为IT服务提供云管理、加快软件与基础架构交付的解决方案。IBM SmartCloud Orchestrator是IBM云产品家族中的一个新产品。 多款IBM产品存在信息泄露漏洞。允许攻击者可以利用漏洞获取敏感信息。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

用户可参考如下供应商提供的安全公告获得补丁信息: http://www-01.ibm.com/support/docview.wss?uid=swg2C1000140

Reference
http://www.securityfocus.com/bid/94440 http://www-01.ibm.com/support/docview.wss?uid=swg2C1000140
Impacted products
Name
['IBM Cloud Orchestrator 2.5', 'IBM Cloud Orchestrator 2.5.01', 'IBM Cloud Orchestrator 2.4', 'IBM Cloud Orchestrator 2.4.0.1', 'IBM Cloud Orchestrator 2.4.0.2', 'IBM Cloud Orchestrator 2.4.0.3', 'IBM SmartCloud Orchestrator 2.3', 'IBM SmartCloud Orchestrator 2.3.0.1']
Show details on source website

{
  "bids": {
    "bid": {
      "bidNumber": "94440"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2016-0203"
    }
  },
  "description": "IBM Cloud Orchestrator\u662f\u7f8e\u56fdIBM\u516c\u53f8\u7684\u4e00\u5957\u4e3aIT\u670d\u52a1\u63d0\u4f9b\u4e91\u7ba1\u7406\u3001\u52a0\u5feb\u8f6f\u4ef6\u4e0e\u57fa\u7840\u67b6\u6784\u4ea4\u4ed8\u7684\u89e3\u51b3\u65b9\u6848\u3002IBM SmartCloud Orchestrator\u662fIBM\u4e91\u4ea7\u54c1\u5bb6\u65cf\u4e2d\u7684\u4e00\u4e2a\u65b0\u4ea7\u54c1\u3002\r\n\r\n\u591a\u6b3eIBM\u4ea7\u54c1\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u5141\u8bb8\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002",
  "discovererName": "IBM",
  "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttp://www-01.ibm.com/support/docview.wss?uid=swg2C1000140",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2016-11638",
  "openTime": "2016-11-30",
  "patchDescription": "IBM Cloud Orchestrator\u662f\u7f8e\u56fdIBM\u516c\u53f8\u7684\u4e00\u5957\u4e3aIT\u670d\u52a1\u63d0\u4f9b\u4e91\u7ba1\u7406\u3001\u52a0\u5feb\u8f6f\u4ef6\u4e0e\u57fa\u7840\u67b6\u6784\u4ea4\u4ed8\u7684\u89e3\u51b3\u65b9\u6848\u3002IBM SmartCloud Orchestrator\u662fIBM\u4e91\u4ea7\u54c1\u5bb6\u65cf\u4e2d\u7684\u4e00\u4e2a\u65b0\u4ea7\u54c1\u3002\r\n\r\n\u591a\u6b3eIBM\u4ea7\u54c1\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u5141\u8bb8\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "\u591a\u6b3eIBM\u4ea7\u54c1\u672c\u5730\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "IBM Cloud Orchestrator 2.5",
      "IBM Cloud Orchestrator  2.5.01",
      "IBM Cloud Orchestrator  2.4",
      "IBM Cloud Orchestrator  2.4.0.1",
      "IBM Cloud Orchestrator  2.4.0.2",
      "IBM Cloud Orchestrator  2.4.0.3",
      "IBM SmartCloud Orchestrator 2.3",
      "IBM SmartCloud Orchestrator  2.3.0.1"
    ]
  },
  "referenceLink": "http://www.securityfocus.com/bid/94440\r\nhttp://www-01.ibm.com/support/docview.wss?uid=swg2C1000140",
  "serverity": "\u4e2d",
  "submitTime": "2016-11-24",
  "title": "\u591a\u6b3eIBM\u4ea7\u54c1\u672c\u5730\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…