First published: Wed Apr 01 2015(Updated: )
The Multicast DNS (mDNS) responder in IBM Security Access Manager for Web 7.x before 7.0.0 FP12 and 8.x before 8.0.1 FP1 inadvertently responds to unicast queries with source addresses that are not link-local, which allows remote attackers to cause a denial of service (traffic amplification) or obtain potentially sensitive information via port-5353 UDP packets.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security Access Manager for Web 7.0 | <=7.0.0.11 | |
IBM Security Access Manager for Web 8.0 | =8.0.0.1 | |
IBM Security Access Manager for Web 8.0 | =8.0.0.2 | |
IBM Security Access Manager for Web 8.0 | =8.0.0.3 | |
IBM Security Access Manager for Web 8.0 | =8.0.0.4 | |
IBM Security Access Manager for Web 8.0 | =8.0.0.5 | |
IBM Security Access Manager for Web 8.0 | =8.0.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1892 has a medium severity rating due to the potential for denial of service and traffic amplification attacks.
To resolve CVE-2015-1892, upgrade to IBM Security Access Manager for Web version 7.0.0 FP12 or higher for 7.x, or 8.0.1 FP1 or higher for 8.x.
CVE-2015-1892 affects IBM Security Access Manager for Web 7.x before 7.0.0 FP12 and 8.x before 8.0.1 FP1.
Yes, CVE-2015-1892 can be exploited by remote attackers to cause denial of service through traffic amplification.
CVE-2015-1892 impacts IBM Security Access Manager for Web versions 7.x and 8.x prior to their respective fixed versions.