IBM MQ 8.x < 8.0.0.3 Multiple Information Disclosure (credentialed check)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

A message queuing application installed on the remote Windows host is
affected by multiple information disclosure vulnerabilities.

Description :

The version of IBM MQ (formerly IBM WebSphere MQ) 8.x installed on
the remote Windows host is missing fix pack 8.0.0.3 or later. It is,
therefore, affected by the following vulnerabilities :

- A flaw exists in the Advanced Message Security policy
when a JMS client application sends a message to the
queue using this policy. Under certain circumstances,
a cleartext duplicate copy of the message could be
created outside the protected payload. An
authenticated, remote attacker can exploit this, using
man-in-the-middle techniques, to disclose sensitive
information. (CVE-2015-1957)

- A flaw exists in the MQ Explorer implementation in
authentication credential handling due to the server
transmitting authentication credentials in cleartext
even if the server has been configured to protect
passwords. An unauthenticated, remote attacker can
can exploit this, using man-in-the-middle techniques,
to disclose authentication credentials.
(CVE-2015-1967)

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.

See also :

https://www-304.ibm.com/support/docview.wss?uid=swg21960506
https://www-304.ibm.com/support/docview.wss?uid=swg21960491
https://www-304.ibm.com/support/docview.wss?uid=swg27043086#8003

Solution :

Apply fix pack 8.0.0.3 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 99906 ()

Bugtraq ID: 75540

CVE ID: CVE-2015-1957
CVE-2015-1967

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now