First published: Tue Oct 03 2017(Updated: )
IBM WebSphere Message Broker (IBM Integration Bus 9.0 and 10.0) could allow an unauthorized user to obtain sensitive information about software versions that could lead to further attacks. IBM X-Force ID: 121341.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Integration Bus for z/OS | =9.0.0.0 | |
IBM Integration Bus for z/OS | =9.0.0.1 | |
IBM Integration Bus for z/OS | =9.0.0.2 | |
IBM Integration Bus for z/OS | =9.0.0.4 | |
IBM Integration Bus for z/OS | =9.0.0.5 | |
IBM Integration Bus for z/OS | =9.0.0.6 | |
IBM Integration Bus for z/OS | =9.0.0.7 | |
IBM Integration Bus for z/OS | =9.0.0.8 | |
IBM Integration Bus for z/OS | =10.0.0.0 | |
IBM Integration Bus for z/OS | =10.0.0.1 | |
IBM Integration Bus for z/OS | =10.0.0.2 | |
IBM Integration Bus for z/OS | =10.0.0.3 | |
IBM Integration Bus for z/OS | =10.0.0.4 | |
IBM Integration Bus for z/OS | =10.0.0.5 | |
IBM Integration Bus for z/OS | =10.0.0.6 | |
IBM Integration Bus for z/OS | =10.0.0.7 | |
IBM Integration Bus for z/OS | =10.0.0.8 | |
IBM Integration Bus for z/OS | =10.0.0.9 | |
IBM WebSphere Message Broker | =8.0.0.0 | |
IBM WebSphere Message Broker | =8.0.0.1 | |
IBM WebSphere Message Broker | =8.0.0.2 | |
IBM WebSphere Message Broker | =8.0.0.3 | |
IBM WebSphere Message Broker | =8.0.0.4 | |
IBM WebSphere Message Broker | =8.0.0.5 | |
IBM WebSphere Message Broker | =8.0.0.6 | |
IBM WebSphere Message Broker | =8.0.0.7 | |
IBM WebSphere Message Broker | =8.0.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1126 has a medium severity rating, indicating a potential compromise of sensitive information.
To fix CVE-2017-1126, update your IBM Integration Bus or WebSphere Message Broker to the latest version that addresses this vulnerability.
CVE-2017-1126 affects IBM Integration Bus versions 9.0.0.0 to 9.0.0.8 and 10.0.0.0 to 10.0.0.9, as well as IBM WebSphere Message Broker versions 8.0.0.0 to 8.0.0.8.
CVE-2017-1126 could allow unauthorized users to obtain sensitive information about the software versions, which may lead to further attacks.
A recommended workaround for CVE-2017-1126 is to restrict access to the affected software components until a patch can be applied.