First published: Tue Sep 25 2012(Updated: )
The server message channel agent in the queue manager in the server in IBM WebSphere MQ 7.0.1 before 7.0.1.9, 7.1, and 7.5 on Solaris allows remote attackers to cause a denial of service (invalid address alignment exception and daemon crash) via vectors involving a multiplexed channel.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM WebSphere MQ | =7.0.1.0 | |
IBM WebSphere MQ | =7.0.1.1 | |
IBM WebSphere MQ | =7.0.1.2 | |
IBM WebSphere MQ | =7.0.1.3 | |
IBM WebSphere MQ | =7.0.1.4 | |
IBM WebSphere MQ | =7.0.1.5 | |
IBM WebSphere MQ | =7.0.1.6 | |
IBM WebSphere MQ | =7.0.1.7 | |
IBM WebSphere MQ | =7.0.1.8 | |
IBM WebSphere MQ | =7.1 | |
IBM WebSphere MQ | =7.5 | |
Oracle Solaris SPARC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2199 is classified as a denial of service vulnerability that may result in a daemon crash.
To remediate CVE-2012-2199, upgrade IBM WebSphere MQ to version 7.0.1.9 or later, or to version 7.1 or 7.5.
CVE-2012-2199 affects IBM WebSphere MQ versions 7.0.1.0 to 7.0.1.8, as well as versions 7.1 and 7.5.
Yes, CVE-2012-2199 can be exploited remotely, allowing attackers to cause a denial of service.
Exploitation of CVE-2012-2199 may lead to service interruptions due to the crash of the server message channel agent.