First published: Sun Jun 28 2015(Updated: )
IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 allows remote attackers to obtain sensitive error-log information via a crafted POST request.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tivoli Directory Server | =6.0 | |
IBM Tivoli Directory Server | =6.1.0 | |
IBM Tivoli Directory Server | =6.2.0.0 | |
IBM Tivoli Directory Server | =6.3.0.0 | |
IBM Tivoli Directory Server | =6.3.1.0 | |
IBM Tivoli Directory Server | =6.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1972 is classified as a medium severity vulnerability that can expose sensitive information to remote attackers.
To fix CVE-2015-1972, apply the latest iFix for your specific version of IBM Tivoli Security Directory Server as listed in the official documentation.
CVE-2015-1972 affects IBM Tivoli Directory Server versions 6.0, 6.1, 6.2, 6.3, 6.3.1, and 6.4 before their respective iFix updates.
CVE-2015-1972 exploits the ability of remote attackers to send crafted POST requests to obtain sensitive error-log information.
Yes, the exposure of sensitive error-log information through CVE-2015-1972 can potentially lead to data breaches if exploited by attackers.