ID

VAR-201811-0107


CVE

CVE-2018-1792


TITLE

IBM WebSphere MQ Code injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-011726

DESCRIPTION

IBM WebSphere MQ 8.0.0.0 through 8.0.0.10, 9.0.0.0 through 9.0.0.5, 9.0.1 through 9.0.5, and 9.1.0.0 could allow a local user to inject code that could be executed with root privileges. IBM X-Force ID: 148947. Vendors have confirmed this vulnerability IBM X-Force ID: 148947 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. An attackers may exploit these issues to execute arbitrary-code with root privileges

Trust: 1.98

sources: NVD: CVE-2018-1792 // JVNDB: JVNDB-2018-011726 // BID: 105936 // VULMON: CVE-2018-1792

AFFECTED PRODUCTS

vendor:ibmmodel:websphere mqscope:eqversion:9.1.0.0

Trust: 2.4

vendor:ibmmodel:websphere mqscope:lteversion:9.0.0.5

Trust: 1.0

vendor:ibmmodel:websphere mqscope:lteversion:9.0.5

Trust: 1.0

vendor:ibmmodel:websphere mqscope:lteversion:8.0.0.10

Trust: 1.0

vendor:ibmmodel:websphere mqscope:gteversion:9.0.1

Trust: 1.0

vendor:ibmmodel:websphere mqscope:gteversion:9.0.0.0

Trust: 1.0

vendor:ibmmodel:websphere mqscope:gteversion:8.0.0.0

Trust: 1.0

vendor:ibmmodel:websphere mqscope:eqversion:8.0.0.0 to 8.0.0.10

Trust: 0.8

vendor:ibmmodel:websphere mqscope:eqversion:9.0.0.0 to 9.0.0.5

Trust: 0.8

vendor:ibmmodel:websphere mqscope:eqversion:9.0.1 to 9.0.5

Trust: 0.8

vendor:ibmmodel:websphere mqscope:eqversion:9.0.0.1

Trust: 0.6

vendor:ibmmodel:websphere mqscope:eqversion:9.0.3

Trust: 0.6

vendor:ibmmodel:websphere mqscope:eqversion:8.0.0.6

Trust: 0.6

vendor:ibmmodel:websphere mqscope:eqversion:8.0.0.4

Trust: 0.6

vendor:ibmmodel:websphere mqscope:eqversion:8.0.0.3

Trust: 0.6

vendor:ibmmodel:websphere mqscope:eqversion:8.0.0.2

Trust: 0.6

vendor:ibmmodel:websphere mqscope:eqversion:9.0.4

Trust: 0.6

vendor:ibmmodel:websphere mqscope:eqversion:8.0.0.7

Trust: 0.6

vendor:ibmmodel:websphere mqscope:eqversion:8.0.0.5

Trust: 0.6

vendor:ibmmodel:mq cdscope:eqversion:9.0.5

Trust: 0.3

vendor:ibmmodel:mq cdscope:eqversion:9.0.3

Trust: 0.3

vendor:ibmmodel:mq cdscope:eqversion:9.0.2

Trust: 0.3

vendor:ibmmodel:mq cdscope:eqversion:9.0.1

Trust: 0.3

vendor:ibmmodel:mq ltsscope:eqversion:9.0.0.3

Trust: 0.3

vendor:ibmmodel:mq ltsscope:eqversion:9.0.0.1

Trust: 0.3

vendor:ibmmodel:mq ltsscope:eqversion:9.0.0.0

Trust: 0.3

vendor:ibmmodel:mqscope:eqversion:8.0.0.9

Trust: 0.3

vendor:ibmmodel:mqscope:eqversion:8.0.0.7

Trust: 0.3

vendor:ibmmodel:mqscope:eqversion:8.0.0.6

Trust: 0.3

vendor:ibmmodel:mqscope:eqversion:8.0.0.5

Trust: 0.3

vendor:ibmmodel:mqscope:eqversion:8.0.0.4

Trust: 0.3

vendor:ibmmodel:mqscope:eqversion:8.0.0.3

Trust: 0.3

vendor:ibmmodel:mqscope:eqversion:8.0.0.2

Trust: 0.3

vendor:ibmmodel:mqscope:eqversion:8.0.0.1

Trust: 0.3

vendor:ibmmodel:mqscope:eqversion:8.0.0.0

Trust: 0.3

vendor:ibmmodel:mqscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:mqscope:neversion:9.1

Trust: 0.3

sources: BID: 105936 // JVNDB: JVNDB-2018-011726 // CNNVD: CNNVD-201811-278 // NVD: CVE-2018-1792

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-1792
value: HIGH

Trust: 1.0

psirt@us.ibm.com: CVE-2018-1792
value: HIGH

Trust: 1.0

NVD: CVE-2018-1792
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201811-278
value: HIGH

Trust: 0.6

VULMON: CVE-2018-1792
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-1792
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2018-1792
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

psirt@us.ibm.com: CVE-2018-1792
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.0
impactScore: 6.0
version: 3.0

Trust: 1.0

sources: VULMON: CVE-2018-1792 // JVNDB: JVNDB-2018-011726 // CNNVD: CNNVD-201811-278 // NVD: CVE-2018-1792 // NVD: CVE-2018-1792

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.8

sources: JVNDB: JVNDB-2018-011726 // NVD: CVE-2018-1792

THREAT TYPE

local

Trust: 0.9

sources: BID: 105936 // CNNVD: CNNVD-201811-278

TYPE

code injection

Trust: 0.6

sources: CNNVD: CNNVD-201811-278

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-011726

PATCH

title:0734447url:https://www-01.ibm.com/support/docview.wss?uid=ibm10734447

Trust: 0.8

title:ibm-websphere-cve20181792-priv-escalation (148947)url:https://exchange.xforce.ibmcloud.com/vulnerabilities/148947

Trust: 0.8

title:IBM MQ Repair measures for library security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86718

Trust: 0.6

title:IBM: IBM Security Bulletin: IBM MQ could allow a local user to inject code that could be executed with root privileges. (CVE-2018-1998)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=72465d2f99054ba61ae311541ab96ff0

Trust: 0.1

title:IBM: IBM Security Bulletin: Multiple IBM MQ Security Vulnerabilities Affect IBM Sterling B2B Integratorurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=12d49a0da922bc87e2a67d963391d2c3

Trust: 0.1

title:security-researchurl:https://github.com/mirchr/security-research

Trust: 0.1

sources: VULMON: CVE-2018-1792 // JVNDB: JVNDB-2018-011726 // CNNVD: CNNVD-201811-278

EXTERNAL IDS

db:NVDid:CVE-2018-1792

Trust: 2.8

db:BIDid:105936

Trust: 2.0

db:JVNDBid:JVNDB-2018-011726

Trust: 0.8

db:AUSCERTid:ESB-2019.0782

Trust: 0.6

db:AUSCERTid:ESB-2019.3122

Trust: 0.6

db:AUSCERTid:ESB-2019.4784

Trust: 0.6

db:CNNVDid:CNNVD-201811-278

Trust: 0.6

db:VULMONid:CVE-2018-1792

Trust: 0.1

sources: VULMON: CVE-2018-1792 // BID: 105936 // JVNDB: JVNDB-2018-011726 // CNNVD: CNNVD-201811-278 // NVD: CVE-2018-1792

REFERENCES

url:http://www.securityfocus.com/bid/105936

Trust: 1.8

url:https://www.ibm.com/support/docview.wss?uid=ibm10734447

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/148947

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-1792

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-1792

Trust: 0.8

url:https://www.ibm.com/support/pages/node/1137634

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1115109

Trust: 0.6

url:https://www.ibm.com/support/docview.wss?uid=ibm10967151

Trust: 0.6

url:http://www.ibm.com/support/docview.wss

Trust: 0.6

url:https://www-01.ibm.com/support/docview.wss?uid=ibm10967151

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1115031

Trust: 0.6

url:https://www.auscert.org.au/bulletins/76906

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.3122/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4784/

Trust: 0.6

url:http://www.ibm.com

Trust: 0.3

url:http://www-4.ibm.com/software/webservers/appserv/

Trust: 0.3

url:https://www-01.ibm.com/support/docview.wss?uid=ibm10734447

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/94.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-mq-could-allow-a-local-user-to-inject-code-that-could-be-executed-with-root-privileges-cve-2018-1998/

Trust: 0.1

url:https://github.com/mirchr/security-research

Trust: 0.1

sources: VULMON: CVE-2018-1792 // BID: 105936 // JVNDB: JVNDB-2018-011726 // CNNVD: CNNVD-201811-278 // NVD: CVE-2018-1792

CREDITS

Rich Mirch

Trust: 0.3

sources: BID: 105936

SOURCES

db:VULMONid:CVE-2018-1792
db:BIDid:105936
db:JVNDBid:JVNDB-2018-011726
db:CNNVDid:CNNVD-201811-278
db:NVDid:CVE-2018-1792

LAST UPDATE DATE

2024-11-23T20:39:19.214000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2018-1792date:2019-10-09T00:00:00
db:BIDid:105936date:2018-11-12T00:00:00
db:JVNDBid:JVNDB-2018-011726date:2019-01-21T00:00:00
db:CNNVDid:CNNVD-201811-278date:2019-12-24T00:00:00
db:NVDid:CVE-2018-1792date:2024-11-21T04:00:22.860

SOURCES RELEASE DATE

db:VULMONid:CVE-2018-1792date:2018-11-13T00:00:00
db:BIDid:105936date:2018-11-12T00:00:00
db:JVNDBid:JVNDB-2018-011726date:2019-01-21T00:00:00
db:CNNVDid:CNNVD-201811-278date:2018-11-12T00:00:00
db:NVDid:CVE-2018-1792date:2018-11-13T15:29:00.373