First published: Wed Mar 08 2017(Updated: )
IBM Tivoli Monitoring 6.2 and 6.3 is vulnerable to possible host header injection attack that could lead to HTTP cache poisoning or firewall bypass. IBM Reference #: 1997223.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tivoli Monitoring | =6.2.2 | |
IBM Tivoli Monitoring | =6.2.2.2 | |
IBM Tivoli Monitoring | =6.2.2.3 | |
IBM Tivoli Monitoring | =6.2.2.4 | |
IBM Tivoli Monitoring | =6.2.2.5 | |
IBM Tivoli Monitoring | =6.2.2.6 | |
IBM Tivoli Monitoring | =6.2.2.7 | |
IBM Tivoli Monitoring | =6.2.2.8 | |
IBM Tivoli Monitoring | =6.2.2.9 | |
IBM Tivoli Monitoring | =6.2.3 | |
IBM Tivoli Monitoring | =6.2.3.1 | |
IBM Tivoli Monitoring | =6.2.3.2 | |
IBM Tivoli Monitoring | =6.2.3.3 | |
IBM Tivoli Monitoring | =6.2.3.4 | |
IBM Tivoli Monitoring | =6.2.3.5 | |
IBM Tivoli Monitoring | =6.3.0 | |
IBM Tivoli Monitoring | =6.3.0.1 | |
IBM Tivoli Monitoring | =6.3.0.2 | |
IBM Tivoli Monitoring | =6.3.0.3 | |
IBM Tivoli Monitoring | =6.3.0.4 | |
IBM Tivoli Monitoring | =6.3.0.5 | |
IBM Tivoli Monitoring | =6.3.0.6 | |
IBM Tivoli Monitoring | =6.3.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5933 is classified as a moderate severity vulnerability due to its potential for HTTP cache poisoning and firewall bypass.
To remediate CVE-2016-5933, it is recommended to apply the latest security patches provided by IBM for Tivoli Monitoring 6.2 and 6.3.
CVE-2016-5933 affects IBM Tivoli Monitoring versions 6.2 and 6.3, specifically versions 6.2.2 through 6.2.3.5 and 6.3.0 through 6.3.0.7.
CVE-2016-5933 facilitates host header injection attacks that could lead to unauthorized cache manipulation.
Yes, CVE-2016-5933 can be exploited remotely, allowing attackers to potentially bypass security features.