IBM Support

Security Bulletin: A security vulnerability has been identified in Apache CXF, which is shipped with IBM Tivoli Network Manager IP Edition (CVE-2017-12624).

Created by Anonymous (not verified) on
Published URL:
https://www.ibm.com/support/pages/node/305321
305321

Security Bulletin


Summary

Apache CXF is shipped with IBM Tivoli Network Manager IP Edition 4.2. Information about a security vulnerability affecting Apache CXF has been published here.

Vulnerability Details

CVEID: CVE-2017-12624
DESCRIPTION:
Apache CXF is vulnerable to a denial of service. By using a specially crafted message attachment header, a remote attacker could exploit this vulnerability to cause the AX-WS and JAX-RS services stop responding.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/135095 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

Affected Products and Versions

IBM Tivoli Network Manager IP Edition 4.2 Fix Pack 4 and earlier.

Remediation/Fixes

Product

VMRFRemediation/First Fix
IBM Tivoli Network Manager IP Edition 4.2.0.4 and earlierUpgrade to ITNM 4.2.0.5
ITNM 4.2.0.5 on IBM Support Fix Central

Please also note the end of support announcement from 12 September 2017 for selected Netcool product versions. You can find detailed information on whether the product version you have installed in your environment is affected by this end of service announcement by following the Netcool End of Support Knowledge Collection. If your product version is affected, IBM recommend to upgrade your product version to the latest supported version of your product. Please contact your IBM account manager for any question you might have or for any assistance you may require for upgrading an end of service announced offering.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Important Note

IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.

References

Off

Change History

May 2 2018 - Initial version published.

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SSSHRK","label":"Tivoli Network Manager IP Edition"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":"Discovery and RCA","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF035","label":"z\/OS"}],"Version":"4.2","Edition":"FP1;FP2;FP3;FP4","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
28 June 2023

UID

swg22014078