First published: Wed Feb 22 2017(Updated: )
IBM WebSphere MQ 8.0 could allow an authenticated user with access to the queue manager to bring down MQ channels using specially crafted HTTP requests. IBM Reference #: 1998648.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM WebSphere MQ | =8.0 | |
IBM WebSphere MQ | =8.0.0.0 | |
IBM WebSphere MQ | =8.0.0.1 | |
IBM WebSphere MQ | =8.0.0.2 | |
IBM WebSphere MQ | =8.0.0.3 | |
IBM WebSphere MQ | =8.0.0.4 | |
IBM WebSphere MQ | =8.0.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-8986 is considered to be high, as it allows an authenticated user to disrupt MQ channels.
To fix CVE-2016-8986, upgrade to a patched version of IBM WebSphere MQ that addresses this vulnerability.
CVE-2016-8986 affects users of IBM WebSphere MQ version 8.0, including all its sub-releases.
With CVE-2016-8986, an attacker can send specially crafted HTTP requests to bring down MQ channels.
Yes, CVE-2016-8986 requires the attacker to be an authenticated user with access to the queue manager.