First published: Sun Oct 30 2011(Updated: )
Heap-based buffer overflow in the client in IBM WebSphere MQ 6.0 before 6.0.2.7 and 7.0 before 7.0.1.0 allows local users to gain privileges via crafted SSL information in a Client Channel Definition Table (CCDT) file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM WebSphere MQ | =6.0.1.0 | |
IBM WebSphere MQ | =6.0 | |
IBM WebSphere MQ | =6.0.2.4 | |
IBM WebSphere MQ | =6.0.1.1 | |
IBM WebSphere MQ | =6.0.2.3 | |
IBM WebSphere MQ | =6.0.2.1 | |
IBM WebSphere MQ | =6.0.2.2 | |
IBM WebSphere MQ | =6.0.2.0 | |
IBM WebSphere MQ | =6.0.2.10 | |
IBM WebSphere MQ | =6.0.2.5 | |
IBM WebSphere MQ | =6.0.2.6 | |
IBM WebSphere MQ | =7.0.0.1 | |
IBM WebSphere MQ | =7.0.0.2 | |
IBM WebSphere MQ | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0900 has a medium severity rating due to the potential for local privilege escalation.
To fix CVE-2009-0900, upgrade IBM WebSphere MQ to version 6.0.2.7 or higher for version 6.0 and 7.0.1.0 or higher for version 7.0.
Users of IBM WebSphere MQ versions 6.0 before 6.0.2.7 and 7.0 before 7.0.1.0 are affected by CVE-2009-0900.
CVE-2009-0900 is a heap-based buffer overflow vulnerability.
CVE-2009-0900 cannot be exploited remotely as it requires local access to the system.