Security Bulletin: Tivoli Business Service Manager – Websphere Potential security exposure(CVE-2012-3325) and Apache Tomcat hash denial of service (CVE-2011-4858)

Share this post:

CVE-2012-3325: After installing an Interim Fix for PM44303 or a Fix Pack containing PM44303, there is a potential security exposure with IBM WebSphere Application Server. This Fix was part of the TIP (1.1.x) component installed with Tivoli Business Service Manager.
CVE-2011-4858: Potential Denial of Service (Dos) security exposure when using Web based applications due to JavaHashTable implementation vulnerability.


Affected product(s) and affected version(s):

Tivoli Business Service Manager 4.2.0, 4.2.1

Refer to the following reference URLs for remediation and additional vulnerability details.
Source Bulletin:
X-Force Database:

More stories

IBM Product Security Incident Response


May 20, 2020 9:00 am EDT

IBM acknowledges and thanks the security researchers and organizations listed below for reporting and working with us to resolve one or more security vulnerabilities in our products and services. Disclosures for 2021 Keith Lee Disclosures for 2020 Honggang Ren of Fortinet’s FortiGuard Labs Pawel Gocyla, (ING Tech Poland) Dries Eestermans, (nynox-dries) Disclosures for 2019 Danang more

A new and advanced Rowhammer-based attack on DDR4 memory

Mar 11, 2020 8:59 am EDT

A new and advanced Rowhammer-based attack on DDR4 memory was announced on March 10, 2020. (CVE-2020-10255) The attack has been shown to cause memory corruption in lab environments. Vulnerability exploitation on IBM Power processor architectures, IBM Z-based architectures, IBM Cloud and IBM storage products would be difficult. No customer actions are currently required. IBM Power more

XSA-353 Security Vulnerabilities

Nov 13, 2019 12:30 pm EST

Security vulnerability CVE-2020-29479 could potentially enable a denial of service attack or allow unauthorized access to the hypervisor, and is addressed by Citrix in XSA-353 security advisories. IBM Cloud has worked with its technology partners to deploy mitigation and remediation measures. There is no known malicious exploit of this vulnerability at this time. more