SynopsisA message queuing application installed on the remote Windows host is affected by multiple information disclosure vulnerabilities.
DescriptionThe version of IBM MQ (formerly IBM WebSphere MQ) 8.x installed on the remote Windows host is missing fix pack 184.108.40.206 or later. It is, therefore, affected by the following vulnerabilities :
- A flaw exists in the Advanced Message Security policy when a JMS client application sends a message to the queue using this policy. Under certain circumstances, a cleartext duplicate copy of the message could be created outside the protected payload. An authenticated, remote attacker can exploit this, using man-in-the-middle techniques, to disclose sensitive information. (CVE-2015-1957)
- A flaw exists in the MQ Explorer implementation in authentication credential handling due to the server transmitting authentication credentials in cleartext even if the server has been configured to protect passwords. An unauthenticated, remote attacker can can exploit this, using man-in-the-middle techniques, to disclose authentication credentials.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
SolutionApply fix pack 220.127.116.11 or later.