New! Vulnerability Priority Rating (VPR)
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.
VPR Score: 5.9
SynopsisA message queuing service installed on the remote host is affected by multiple vulnerabilities.
DescriptionAccording to its self-reported version, the IBM WebSphere MQ server installed on the remote Windows host is 9.0.1 or 9.0.2 prior to 9.0.3.
It is, therefore, affected by multiple vulnerabilities :
- An information disclosure vulnerability exists due to the insecure transmission of credentials in cleartext. A man-in-the-middle attacker can exploit this to disclose password information. Note that the software is only affected when PASSWORDPROTECTION=ALWAYS is set in mqclient.ini. (CVE-2017-1337)
- An information disclosure vulnerability exists in WebSphere Application server traces when establishing CLIENT transport mode connections. A local attacker can exploit this to disclose sensitive information including passwords. (CVE-2017-1284)
- A denial of service vulnerability exists due to improper handling of invalid messages. An authenticated, remote attacker can exploit this to cause an SDR or CLUSSDR channel to stop processing messages.
SolutionUpgrade to WebSphere MQ version 9.0.3 or later.