First published: Sat Jul 02 2016(Updated: )
IBM TRIRIGA Application Platform 3.3 before 3.3.2.6, 3.4 before 3.4.2.4, and 3.5 before 3.5.0.2 allows remote authenticated users to obtain sensitive information by reading HTTP responses.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM TRIRIGA Application Platform | =3.3.0.0 | |
IBM TRIRIGA Application Platform | =3.3.0.1 | |
IBM TRIRIGA Application Platform | =3.3.0.2 | |
IBM TRIRIGA Application Platform | =3.3.1.0 | |
IBM TRIRIGA Application Platform | =3.3.1.1 | |
IBM TRIRIGA Application Platform | =3.3.1.2 | |
IBM TRIRIGA Application Platform | =3.3.1.3 | |
IBM TRIRIGA Application Platform | =3.3.2.0 | |
IBM TRIRIGA Application Platform | =3.3.2.1 | |
IBM TRIRIGA Application Platform | =3.3.2.3 | |
IBM TRIRIGA Application Platform | =3.3.2.4 | |
IBM TRIRIGA Application Platform | =3.3.2.5 | |
IBM TRIRIGA Application Platform | =3.4.0.0 | |
IBM TRIRIGA Application Platform | =3.4.1.1 | |
IBM TRIRIGA Application Platform | =3.4.1.2 | |
IBM TRIRIGA Application Platform | =3.4.1.3 | |
IBM TRIRIGA Application Platform | =3.4.2.0 | |
IBM TRIRIGA Application Platform | =3.4.2.1 | |
IBM TRIRIGA Application Platform | =3.4.2.2 | |
IBM TRIRIGA Application Platform | =3.4.2.3 | |
IBM TRIRIGA Application Platform | =3.5.0.0 | |
IBM TRIRIGA Application Platform | =3.5.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2882 has a moderate severity rating as it allows remote authenticated users to access sensitive information.
To fix CVE-2016-2882, update the IBM TRIRIGA Application Platform to version 3.3.2.6, 3.4.2.4, or 3.5.0.2, or later.
CVE-2016-2882 affects users of IBM TRIRIGA Application Platform versions 3.3.x prior to 3.3.2.6, 3.4.x prior to 3.4.2.4, and 3.5.x prior to 3.5.0.2.
CVE-2016-2882 can allow remote authenticated users to obtain sensitive information from HTTP responses.
Yes, CVE-2016-2882 was addressed in the updates: 3.3.2.6, 3.4.2.4, and 3.5.0.2.