First published: Sun Oct 19 2014(Updated: )
IBM WebSphere MQ classes for Java libraries 8.0 before 8.0.0.1 and Websphere MQ Explorer 7.5 before 7.5.0.5 and 8.0 before 8.0.0.2 allow local users to discover preconfigured cleartext passwords via an unspecified trace operation.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM WebSphere MQ Appliance | =8.0.0.0 | |
IBM WebSphere MQ Explorer | =7.5.0.0 | |
IBM WebSphere MQ Explorer | =7.5.0.1 | |
IBM WebSphere MQ Explorer | =7.5.0.2 | |
IBM WebSphere MQ Explorer | =7.5.0.3 | |
IBM WebSphere MQ Explorer | =7.5.0.4 | |
IBM WebSphere MQ Explorer | =8.0.0.0 | |
IBM WebSphere MQ Explorer | =8.0.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4822 has been rated as a medium severity vulnerability due to its potential for local users to discover cleartext passwords.
To fix CVE-2014-4822, update WebSphere MQ classes for Java libraries to version 8.0.0.1 or higher, and WebSphere MQ Explorer to version 7.5.0.5 or higher.
CVE-2014-4822 affects IBM WebSphere MQ classes for Java 8.0.0.0 and older, and IBM WebSphere MQ Explorer versions 7.5.0.0 to 7.5.0.4 and 8.0.0.0.
Yes, local users can exploit CVE-2014-4822 to access preconfigured cleartext passwords through an unspecified trace operation.
No, CVE-2014-4822 is a local vulnerability, meaning it can only be exploited by users with local access to the affected systems.