First published: Fri Jun 21 2013(Updated: )
The Basic Services component in IBM Tivoli Monitoring (ITM) 6.2.0 through FP3, 6.2.1 through FP4, 6.2.2 through FP9, and 6.2.3 before FP3, as used in IBM Application Manager for Smart Business (formerly Tivoli Foundations Application Manager) 1.2.1 before 1.2.1.0-TIV-IAMSB-FP0004 and other products, allows remote attackers to cause a denial of service (abend) via a crafted URL.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tivoli Monitoring | =6.2.0 | |
IBM Tivoli Monitoring | =6.2.0.1 | |
IBM Tivoli Monitoring | =6.2.0.2 | |
IBM Tivoli Monitoring | =6.2.0.3 | |
IBM Tivoli Monitoring | =6.2.1 | |
IBM Tivoli Monitoring | =6.2.1.1 | |
IBM Tivoli Monitoring | =6.2.1.2 | |
IBM Tivoli Monitoring | =6.2.1.3 | |
IBM Tivoli Monitoring | =6.2.1.4 | |
IBM Tivoli Monitoring | =6.2.2 | |
IBM Tivoli Monitoring | =6.2.2.1 | |
IBM Tivoli Monitoring | =6.2.2.2 | |
IBM Tivoli Monitoring | =6.2.2.3 | |
IBM Tivoli Monitoring | =6.2.2.4 | |
IBM Tivoli Monitoring | =6.2.2.5 | |
IBM Tivoli Monitoring | =6.2.2.6 | |
IBM Tivoli Monitoring | =6.2.2.7 | |
IBM Tivoli Monitoring | =6.2.2.8 | |
IBM Tivoli Monitoring | =6.2.2.9 | |
IBM Tivoli Monitoring | =6.2.3 | |
IBM Tivoli Monitoring | =6.2.3.1 | |
IBM Tivoli Monitoring | =6.2.3.2 | |
IBM Application Manager for Smart Business | =1.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0551 has a severity level that is classified as moderate due to potential information disclosure risks.
To fix CVE-2013-0551, you should apply the necessary patches provided by IBM for affected versions of Tivoli Monitoring and Application Manager for Smart Business.
CVE-2013-0551 affects IBM Tivoli Monitoring versions 6.2.0 to 6.2.3 and IBM Application Manager for Smart Business version 1.2.1.
The impact of CVE-2013-0551 includes the potential for unauthorized access to sensitive information in the affected systems.
CVE-2013-0551 may still be a concern if your systems have not been updated or patched to mitigate this vulnerability.