Vulnerabilites related to ibm - installation_manager
Vulnerability from fkie_nvd
Published
2009-10-01 15:30
Modified
2024-11-21 01:07
Severity ?
Summary
Argument injection vulnerability in the iim: URI handler in IBMIM.exe in IBM Installation Manager 1.3.2 and earlier, as used in IBM Rational Robot and Rational Team Concert, allows remote attackers to load arbitrary DLL files via the -vm option, as demonstrated by a reference to a UNC share pathname.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ibm | installation_manager | * | |
ibm | installation_manager | 1.0 | |
ibm | installation_manager | 1.2.1 | |
ibm | installation_manager | 1.3.0 | |
ibm | installation_manager | 1.3.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:installation_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FECD493-7B46-4F1C-AC12-D779D31402FD", "versionEndIncluding": "1.3.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:installation_manager:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "632CE789-4E2F-4B37-A771-57572D7FA9FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:installation_manager:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "984D6F98-FB9E-4E14-BA1A-5393A382E61C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:installation_manager:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E47960B-7264-4A44-88D1-F97EE0F43BB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:installation_manager:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "2B5BFEE9-DD95-4860-B8A6-4B6C1EF510EC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Argument injection vulnerability in the iim: URI handler in IBMIM.exe in IBM Installation Manager 1.3.2 and earlier, as used in IBM Rational Robot and Rational Team Concert, allows remote attackers to load arbitrary DLL files via the -vm option, as demonstrated by a reference to a UNC share pathname." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n de argumento en iim: manejador URI en IBMIM.exe en IBM Installation Manager v1.3.2 y anteriores, usado en IBM Rational Robot y Rational Team Concert, permite a atacantes remotos cargar librer\u00edas DLL de su elecci\u00f3n a trav\u00e9s de la opci\u00f3n -vm, como queda demostrado por una referencia a una ruta de fichero compartido UNC." } ], "id": "CVE-2009-3518", "lastModified": "2024-11-21T01:07:33.617", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-10-01T15:30:00.377", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://retrogod.altervista.org/9sg_ibm_uri.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36906" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2792" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://retrogod.altervista.org/9sg_ibm_uri.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36906" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2792" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-03-25 01:59
Modified
2024-11-21 02:13
Severity ?
Summary
IBM Rational ClearCase 8.0.0 before 8.0.0.14 and 8.0.1 before 8.0.1.7, when Installation Manager before 1.8.2 is used, retains cleartext server passwords in process memory throughout the installation procedure, which might allow local users to obtain sensitive information by leveraging access to the installation account.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@us.ibm.com | http://www-01.ibm.com/support/docview.wss?uid=swg21688450 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21688450 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ibm | installation_manager | * | |
ibm | rational_clearcase | 8.0.0 | |
ibm | rational_clearcase | 8.0.0.1 | |
ibm | rational_clearcase | 8.0.0.2 | |
ibm | rational_clearcase | 8.0.0.3 | |
ibm | rational_clearcase | 8.0.0.4 | |
ibm | rational_clearcase | 8.0.0.5 | |
ibm | rational_clearcase | 8.0.0.6 | |
ibm | rational_clearcase | 8.0.0.7 | |
ibm | rational_clearcase | 8.0.0.8 | |
ibm | rational_clearcase | 8.0.0.9 | |
ibm | rational_clearcase | 8.0.0.10 | |
ibm | rational_clearcase | 8.0.0.11 | |
ibm | rational_clearcase | 8.0.0.12 | |
ibm | rational_clearcase | 8.0.0.13 | |
ibm | rational_clearcase | 8.0.1 | |
ibm | rational_clearcase | 8.0.1.1 | |
ibm | rational_clearcase | 8.0.1.2 | |
ibm | rational_clearcase | 8.0.1.3 | |
ibm | rational_clearcase | 8.0.1.4 | |
ibm | rational_clearcase | 8.0.1.5 | |
ibm | rational_clearcase | 8.0.1.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:installation_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CC55684-C384-4834-8D0E-E773271E9DF6", "versionEndIncluding": "1.8.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:rational_clearcase:8.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC77F840-B9AB-48F4-840E-C38F7E947399", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:8.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "305EE299-029D-4AEC-B738-4DB7F841E774", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:8.0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "C585B19A-3A0E-4D49-92EA-147A0389D77C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:8.0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DFE9D77A-6462-461C-B651-FE2A8B239E0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:8.0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "BFAA6B9C-96ED-4C76-9AEE-2285D29F6DB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:8.0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "571A1E6F-05EC-43CC-9B31-39FEE3C2D173", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:8.0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "0260695E-777E-4A33-BF4E-ABC51D3AA77C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:8.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "85321EB9-969F-4A2F-9001-CD7B2988838B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:8.0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EE71E5A6-D24E-4C54-8CFF-84DD4B88D9A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:8.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "2D5B1D4E-C744-4953-92C4-FFBD42319037", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:8.0.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "443B795B-F32F-449A-BB35-8538239BD5E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:8.0.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "15872130-8ABE-4D3F-9D06-37C90666F3CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:8.0.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "30D45D8C-4917-4F07-82E8-6FB909769897", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:8.0.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "169B3158-9039-40D9-B408-533D50448059", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:8.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6873B05A-D699-4337-AA66-5C414F8ED078", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:8.0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F069484-AD4A-47D8-87F9-1BDB9801EC7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:8.0.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "A0CDDF5F-0CD8-4D7B-9BB4-80B8245EAE21", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:8.0.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "68CE3BBC-7607-46C5-BF9A-871F55D437D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:8.0.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "4C59C974-2F5F-4F40-AAD1-09957758FF01", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:8.0.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "0F732B2D-6996-4D62-9D81-E1452E982A93", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:8.0.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "7118232D-D226-4856-80E1-1EC42DFFFFE9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Rational ClearCase 8.0.0 before 8.0.0.14 and 8.0.1 before 8.0.1.7, when Installation Manager before 1.8.2 is used, retains cleartext server passwords in process memory throughout the installation procedure, which might allow local users to obtain sensitive information by leveraging access to the installation account." }, { "lang": "es", "value": "IBM Rational ClearCase 8.0.0 anterior a 8.0.0.14 y 8.0.1 anterior a 8.0.1.7, cuando se utiliza Installation Manager anterior a 1.8.2, retiene las contrase\u00f1as del servidor en texto plano en la memoria de proceso durante todo el procedimiento de instalaci\u00f3n, lo que podr\u00eda permitir a usuarios locales obtener informaci\u00f3n sensible mediante el aprovechamiento del acceso a la cuenta de instalaci\u00f3n." } ], "id": "CVE-2014-6134", "lastModified": "2024-11-21T02:13:50.117", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.2, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-03-25T01:59:03.767", "references": [ { "source": "psirt@us.ibm.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688450" } ], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-01-02 05:59
Modified
2024-11-21 02:36
Severity ?
Summary
consoleinst.sh in IBM Installation Manager before 1.7.4.4 and 1.8.x before 1.8.4 and Packaging Utility before 1.7.4.4 and 1.8.x before 1.8.4 allows local users to gain privileges via a Trojan horse program that is located in /tmp with a name based on a predicted PID value.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ibm | installation_manager | 1.7.4.3 | |
ibm | installation_manager | 1.8.0.0 | |
ibm | installation_manager | 1.8.1.0 | |
ibm | installation_manager | 1.8.2.0 | |
ibm | installation_manager | 1.8.2.1 | |
ibm | installation_manager | 1.8.3.0 | |
ibm | packaging_utility | * | |
ibm | packaging_utility | 1.8.0.0 | |
ibm | packaging_utility | 1.8.1.0 | |
ibm | packaging_utility | 1.8.2.0 | |
ibm | packaging_utility | 1.8.2.1 | |
ibm | packaging_utility | 1.8.3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:installation_manager:1.7.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "18D3ECA6-715B-4D59-9430-6A5DE756F5EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:installation_manager:1.8.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "ACDFE958-4E0F-4183-8739-C498FA63F93D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:installation_manager:1.8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DBB0B189-5BE0-48BF-A1A6-DC393DDADBBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:installation_manager:1.8.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "812CE3AC-A49C-4FDF-85B5-7F9E5415C7B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:installation_manager:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A900A7D5-2A90-4D15-9050-8183C914F9D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:installation_manager:1.8.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "665957F6-49DC-4F6B-A32D-BD7B5936E410", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:packaging_utility:*:*:*:*:*:*:*:*", "matchCriteriaId": "07F44DD6-459C-4096-BE39-FC7BF7D7D8A9", "versionEndIncluding": "1.7.4.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:packaging_utility:1.8.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "470A1088-34BD-464B-A067-04C091002C44", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:packaging_utility:1.8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "51924861-5DAF-4625-95C2-CD034B938EA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:packaging_utility:1.8.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "44A68A05-B6E4-41BE-BEE1-4D118CEB8041", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:packaging_utility:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0B371A4D-D284-4D0F-B108-C17B8B921B20", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:packaging_utility:1.8.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "9367A409-69FD-4AD8-A0DC-93FA996942B8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "consoleinst.sh in IBM Installation Manager before 1.7.4.4 and 1.8.x before 1.8.4 and Packaging Utility before 1.7.4.4 and 1.8.x before 1.8.4 allows local users to gain privileges via a Trojan horse program that is located in /tmp with a name based on a predicted PID value." }, { "lang": "es", "value": "consoleinst.sh en IBM Installation Manager en versiones anteriores a 1.7.4.4 y 1.8.x en versiones anteriores a 1.8.4 y Packaging Utility en versiones anteriores a 1.7.4.4 y 1.8.x en versiones anteriores a 1.8.4 permite a usuarios locales obtener privilegios a trav\u00e9s de un programa Troyano que est\u00e1 localizado en /tmp con un nombre con un nombre basado en un valor PID predecido." } ], "id": "CVE-2015-7442", "lastModified": "2024-11-21T02:36:47.933", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-01-02T05:59:07.767", "references": [ { "source": "psirt@us.ibm.com", "tags": [ "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21971295" }, { "source": "psirt@us.ibm.com", "url": "http://www.securityfocus.com/bid/77558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21971295" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/77558" } ], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2015-7442
Vulnerability from cvelistv5
Published
2016-01-02 02:00
Modified
2024-08-06 07:51
Severity ?
EPSS score ?
Summary
consoleinst.sh in IBM Installation Manager before 1.7.4.4 and 1.8.x before 1.8.4 and Packaging Utility before 1.7.4.4 and 1.8.x before 1.8.4 allows local users to gain privileges via a Trojan horse program that is located in /tmp with a name based on a predicted PID value.
References
▼ | URL | Tags |
---|---|---|
http://www-01.ibm.com/support/docview.wss?uid=swg21971295 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/77558 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:51:27.459Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21971295" }, { "name": "77558", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/77558" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-10T00:00:00", "descriptions": [ { "lang": "en", "value": "consoleinst.sh in IBM Installation Manager before 1.7.4.4 and 1.8.x before 1.8.4 and Packaging Utility before 1.7.4.4 and 1.8.x before 1.8.4 allows local users to gain privileges via a Trojan horse program that is located in /tmp with a name based on a predicted PID value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21971295" }, { "name": "77558", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/77558" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "ID": "CVE-2015-7442", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "consoleinst.sh in IBM Installation Manager before 1.7.4.4 and 1.8.x before 1.8.4 and Packaging Utility before 1.7.4.4 and 1.8.x before 1.8.4 allows local users to gain privileges via a Trojan horse program that is located in /tmp with a name based on a predicted PID value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21971295", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21971295" }, { "name": "77558", "refsource": "BID", "url": "http://www.securityfocus.com/bid/77558" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2015-7442", "datePublished": "2016-01-02T02:00:00", "dateReserved": "2015-09-29T00:00:00", "dateUpdated": "2024-08-06T07:51:27.459Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-6134
Vulnerability from cvelistv5
Published
2015-03-25 01:00
Modified
2024-08-06 12:10
Severity ?
EPSS score ?
Summary
IBM Rational ClearCase 8.0.0 before 8.0.0.14 and 8.0.1 before 8.0.1.7, when Installation Manager before 1.8.2 is used, retains cleartext server passwords in process memory throughout the installation procedure, which might allow local users to obtain sensitive information by leveraging access to the installation account.
References
▼ | URL | Tags |
---|---|---|
http://www-01.ibm.com/support/docview.wss?uid=swg21688450 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:10:12.046Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688450" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-18T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Rational ClearCase 8.0.0 before 8.0.0.14 and 8.0.1 before 8.0.1.7, when Installation Manager before 1.8.2 is used, retains cleartext server passwords in process memory throughout the installation procedure, which might allow local users to obtain sensitive information by leveraging access to the installation account." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-03-25T01:57:00", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688450" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "ID": "CVE-2014-6134", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Rational ClearCase 8.0.0 before 8.0.0.14 and 8.0.1 before 8.0.1.7, when Installation Manager before 1.8.2 is used, retains cleartext server passwords in process memory throughout the installation procedure, which might allow local users to obtain sensitive information by leveraging access to the installation account." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21688450", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688450" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2014-6134", "datePublished": "2015-03-25T01:00:00", "dateReserved": "2014-09-02T00:00:00", "dateUpdated": "2024-08-06T12:10:12.046Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-3518
Vulnerability from cvelistv5
Published
2009-10-01 15:00
Modified
2024-09-16 23:27
Severity ?
EPSS score ?
Summary
Argument injection vulnerability in the iim: URI handler in IBMIM.exe in IBM Installation Manager 1.3.2 and earlier, as used in IBM Rational Robot and Rational Team Concert, allows remote attackers to load arbitrary DLL files via the -vm option, as demonstrated by a reference to a UNC share pathname.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2009/2792 | vdb-entry, x_refsource_VUPEN | |
http://retrogod.altervista.org/9sg_ibm_uri.html | x_refsource_MISC | |
http://secunia.com/advisories/36906 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:31:10.448Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2009-2792", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2792" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://retrogod.altervista.org/9sg_ibm_uri.html" }, { "name": "36906", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36906" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Argument injection vulnerability in the iim: URI handler in IBMIM.exe in IBM Installation Manager 1.3.2 and earlier, as used in IBM Rational Robot and Rational Team Concert, allows remote attackers to load arbitrary DLL files via the -vm option, as demonstrated by a reference to a UNC share pathname." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-10-01T15:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2009-2792", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2792" }, { "tags": [ "x_refsource_MISC" ], "url": "http://retrogod.altervista.org/9sg_ibm_uri.html" }, { "name": "36906", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36906" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3518", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Argument injection vulnerability in the iim: URI handler in IBMIM.exe in IBM Installation Manager 1.3.2 and earlier, as used in IBM Rational Robot and Rational Team Concert, allows remote attackers to load arbitrary DLL files via the -vm option, as demonstrated by a reference to a UNC share pathname." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2009-2792", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2792" }, { "name": "http://retrogod.altervista.org/9sg_ibm_uri.html", "refsource": "MISC", "url": "http://retrogod.altervista.org/9sg_ibm_uri.html" }, { "name": "36906", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36906" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3518", "datePublished": "2009-10-01T15:00:00Z", "dateReserved": "2009-10-01T00:00:00Z", "dateUpdated": "2024-09-16T23:27:10.464Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }