First published: Fri Aug 22 2014(Updated: )
IBM WebSphere Application Server (WAS) 7.0.x before 7.0.0.33, 8.0.x before 8.0.0.9, and 8.5.x before 8.5.5.3 allows remote attackers to obtain sensitive information via a crafted SOAP response.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM WebSphere Application Server Feature Pack for Web Services | =8.5.0.0 | |
IBM WebSphere Application Server Feature Pack for Web Services | =8.5.0.1 | |
IBM WebSphere Application Server Feature Pack for Web Services | =8.5.0.2 | |
IBM WebSphere Application Server Feature Pack for Web Services | =8.5.5.0 | |
IBM WebSphere Application Server Feature Pack for Web Services | =8.5.5.1 | |
IBM WebSphere Application Server Feature Pack for Web Services | =8.5.5.2 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.1 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.2 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.3 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.10 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.11 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.12 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.13 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.14 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.15 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.16 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.17 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.18 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.19 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.21 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.22 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.23 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.24 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.25 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.27 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.29 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.31 | |
IBM WebSphere Application Server Feature Pack for Web Services | =8.0.0.0 | |
IBM WebSphere Application Server Feature Pack for Web Services | =8.0.0.1 | |
IBM WebSphere Application Server Feature Pack for Web Services | =8.0.0.2 | |
IBM WebSphere Application Server Feature Pack for Web Services | =8.0.0.3 | |
IBM WebSphere Application Server Feature Pack for Web Services | =8.0.0.4 | |
IBM WebSphere Application Server Feature Pack for Web Services | =8.0.0.5 | |
IBM WebSphere Application Server Feature Pack for Web Services | =8.0.0.6 | |
IBM WebSphere Application Server Feature Pack for Web Services | =8.0.0.7 | |
IBM WebSphere Application Server Feature Pack for Web Services | =8.0.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0965 has a medium severity rating, indicating it poses a moderate risk to information security.
CVE-2014-0965 affects IBM WebSphere Application Server versions 7.0.x prior to 7.0.0.33, 8.0.x prior to 8.0.0.9, and 8.5.x prior to 8.5.5.3.
To mitigate CVE-2014-0965, you should upgrade your IBM WebSphere Application Server to the latest patched version, specifically 7.0.0.33, 8.0.0.9, or 8.5.5.3 and later.
CVE-2014-0965 could allow remote attackers to obtain sensitive information through a specially crafted SOAP response.
While immediate updates are recommended, avoiding the exposure of vulnerable services can act as a temporary workaround for CVE-2014-0965.