First published: Fri Jun 21 2013(Updated: )
The internal web server in the Basic Services component in IBM Tivoli Monitoring (ITM) 6.2.0 through FP3, 6.2.1 through FP4, 6.2.2 through FP9, and 6.2.3 before FP3, as used in IBM Application Manager for Smart Business (formerly Tivoli Foundations Application Manager) 1.2.1 before 1.2.1.0-TIV-IAMSB-FP0004 and other products, allows remote attackers to perform unspecified redirection of HTTP requests, and bypass the proxy-server configuration, via crafted HTTP traffic.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tivoli Monitoring | =6.2.0 | |
IBM Tivoli Monitoring | =6.2.0.1 | |
IBM Tivoli Monitoring | =6.2.0.2 | |
IBM Tivoli Monitoring | =6.2.0.3 | |
IBM Tivoli Monitoring | =6.2.1 | |
IBM Tivoli Monitoring | =6.2.1.1 | |
IBM Tivoli Monitoring | =6.2.1.2 | |
IBM Tivoli Monitoring | =6.2.1.3 | |
IBM Tivoli Monitoring | =6.2.1.4 | |
IBM Tivoli Monitoring | =6.2.2 | |
IBM Tivoli Monitoring | =6.2.2.1 | |
IBM Tivoli Monitoring | =6.2.2.2 | |
IBM Tivoli Monitoring | =6.2.2.3 | |
IBM Tivoli Monitoring | =6.2.2.4 | |
IBM Tivoli Monitoring | =6.2.2.5 | |
IBM Tivoli Monitoring | =6.2.2.6 | |
IBM Tivoli Monitoring | =6.2.2.7 | |
IBM Tivoli Monitoring | =6.2.2.8 | |
IBM Tivoli Monitoring | =6.2.2.9 | |
IBM Tivoli Monitoring | =6.2.3 | |
IBM Tivoli Monitoring | =6.2.3.1 | |
IBM Tivoli Monitoring | =6.2.3.2 | |
IBM Application Manager for Smart Business | =1.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2961 is classified as a high severity vulnerability due to its potential to allow unauthorized access to sensitive information.
To fix CVE-2013-2961, upgrade IBM Tivoli Monitoring to the latest fix pack provided by IBM.
CVE-2013-2961 affects IBM Tivoli Monitoring versions 6.2.0 through FP3, 6.2.1 through FP4, 6.2.2 through FP9, and 6.2.3 before FP3.
The internal web server in the Basic Services component of IBM Tivoli Monitoring is affected by CVE-2013-2961.
No specific workaround is provided for CVE-2013-2961; the recommended action is to apply the necessary updates.