First published: Sun Jun 28 2015(Updated: )
The web administration tool in IBM Tivoli Security Directory Server 6.0 before iFix 75, 6.1 before iFix 68, 6.2 before iFix 44, 6.3 before iFix 37, 6.3.1 before iFix 11, and 6.4 before iFix 2 allows remote authenticated users to bypass intended command restrictions via unspecified vectors.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tivoli Directory Server | =6.0 | |
IBM Tivoli Directory Server | =6.1.0 | |
IBM Tivoli Directory Server | =6.2.0.0 | |
IBM Tivoli Directory Server | =6.3.0.0 | |
IBM Tivoli Directory Server | =6.3.1.0 | |
IBM Tivoli Directory Server | =6.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1974 is considered a high severity vulnerability due to its potential for remote authenticated users to bypass command restrictions.
To fix CVE-2015-1974, upgrade to the appropriate fix version of IBM Tivoli Security Directory Server as recommended in the security advisory.
CVE-2015-1974 affects IBM Tivoli Security Directory Server versions 6.0, 6.1, 6.2, 6.3, 6.3.1, and 6.4 before their respective iFixes.
The risks associated with CVE-2015-1974 include unauthorized access and execution of commands potentially leading to data breaches.
Currently, there is no publicly documented workaround for CVE-2015-1974; applying the appropriate iFix is the recommended mitigation.