IBM WebSphere MQ 7.1 / 7.5 Multiple Vulnerabilities

high Nessus Plugin ID 63099


The remote Windows host has a service installed that is affected by multiple vulnerabilities.


The version of IBM WebSphere MQ server is version 7.1 without Fix Pack or 7.5 without Fix Pack It is, therefore, affected by the following vulnerabilities :

- A flaw exists in Global Security Kit (GSkit) due to a failure to properly validate data when the 'protection mechanism' is executed against an SSL CBC timing attack.
A remote attacker, using crafted values in the TLS Record Layer, can exploit this to cause a denial of service.

- A flaw exists in Global Security Kit (GSkit) due to a failure to properly verify certificates, which can allow a remote attacker to conduct a man-in-the-middle attack.

- An application can potentially put a sequence of large messages into the queue, causing a buffer to overflow in the queue manager. This can lead to a denial of service.


Apply fix pack or later.

See Also

Plugin Details

Severity: High

ID: 63099

File Name: websphere_mq_7100_7102.nasl

Version: 1.8

Type: local

Agent: windows

Family: Windows

Published: 11/29/2012

Updated: 8/6/2018

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: Medium

Score: 5.2


Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:ibm:websphere_mq

Required KB Items: installed_sw/IBM WebSphere MQ

Exploit Ease: No known exploits are available

Patch Publication Date: 11/9/2012

Vulnerability Publication Date: 7/30/2012

Reference Information

CVE: CVE-2012-2191, CVE-2012-2203, CVE-2012-4863

BID: 54743, 56471