CERTA-2009-AVI-151
Vulnerability from certfr_avis

De multiples vulnérabilités ont été corrigées dans le microgiciel IBM BladeCenter Advanced Management Module.

Description

Plusieurs vulnérabilités ont été corrigées dans IBM BladeCenter Advanced Management Module. Ces vulnérabilités permettent à une personne malintentionnée d'effectuer des injections de code indirectes (xss), des injections de requêtes illégitimes par rebond (csrf) et/ou de porter atteinte à la confidentialité de certaines données.

Solution

La mise à jour du microgiciel en version 1.42U corrige les problèmes.

IBM BladeCenter Advanced Management Module firmware 1.x.

Impacted products
Vendor Product Description

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cP\u003eIBM BladeCenter Advanced Management Module firmware 1.x.\u003c/P\u003e",
  "content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans IBM BladeCenter Advanced\nManagement Module. Ces vuln\u00e9rabilit\u00e9s permettent \u00e0 une personne\nmalintentionn\u00e9e d\u0027effectuer des injections de code indirectes (xss), des\ninjections de requ\u00eates ill\u00e9gitimes par rebond (csrf) et/ou de porter\natteinte \u00e0 la confidentialit\u00e9 de certaines donn\u00e9es.\n\n## Solution\n\nLa mise \u00e0 jour du microgiciel en version 1.42U corrige les probl\u00e8mes.\n",
  "cves": [
    {
      "name": "CVE-2009-1290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1290"
    },
    {
      "name": "CVE-2009-1289",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1289"
    },
    {
      "name": "CVE-2009-1288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1288"
    }
  ],
  "initial_release_date": "2009-04-17T00:00:00",
  "last_revision_date": "2009-04-17T00:00:00",
  "links": [
    {
      "title": "Obtention et liste des modifications du Firmware v1.42U    (BPET42U) :",
      "url": "http://www-947.ibm.com/systems/support/supportsite.wss/docdisplay?Indocid=MIGR-5076204\u0026brandind=5000020"
    },
    {
      "title": "Obtention et liste des modifications du Firmware v1.42U    (BBET42U) :",
      "url": "http://www-947.ibm.com/systems/support/supportsite.wss/docdisplay?Indocid=MIGR-5076206\u0026brandind=5000020"
    }
  ],
  "reference": "CERTA-2009-AVI-151",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2009-04-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans le microgiciel \u003cspan\nclass=\"textit\"\u003eIBM BladeCenter Advanced Management Module\u003c/span\u003e.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM BladeCenter Advanced Management Module",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Liste de modifications du microgiciel v1.42U",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…