First published: Sat Oct 29 2011(Updated: )
The default configuration of the Sametime configuration servlet (SCS) in the server in IBM Lotus Sametime 7.0 through 8.5.2 does not enable an authentication requirement, which allows remote attackers to read the configuration settings by examining a response message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sametime | =7.0 | |
IBM Sametime | =7.5 | |
IBM Sametime | =7.5.0.1 | |
IBM Sametime | =7.5.1 | |
IBM Sametime | =7.5.1.1 | |
IBM Sametime | =7.5.1.2 | |
IBM Sametime | =8.0 | |
IBM Sametime | =8.0.1 | |
IBM Sametime | =8.0.2 | |
IBM Sametime | =8.5 | |
IBM Sametime | =8.5.1 | |
IBM Sametime | =8.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1370 is considered a medium severity vulnerability due to its ability to allow unauthorized access to sensitive configuration settings.
To fix CVE-2011-1370, configure the Sametime configuration servlet to require authentication to access its settings.
CVE-2011-1370 affects IBM Lotus Sametime versions 7.0 through 8.5.2.
Yes, CVE-2011-1370 can be exploited remotely without requiring authentication.
CVE-2011-1370 potentially allows attackers to read sensitive configuration data, which could lead to further exploitation of the system.