Vulnerabilities > CVE-2019-4568 - Unspecified vulnerability in IBM MQ and MQ Appliance

047910
CVSS 5.9 - MEDIUM
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
HIGH
network
high complexity
ibm
nessus

Summary

IBM MQ and IBM MQ Appliance 8.0 and 9.0 LTS could allow a remote attacker with intimate knowledge of the server to cause a denial of service when receiving data on the channel. IBM X-Force ID: 166629.

Nessus

NASL familyWindows
NASL idWEBSPHERE_MQ_IBM1106517.NASL
descriptionAccording to its self-reported version, the IBM MQ server installed on the remote host is 8.0.0.x prior to 8.0.0.14 or 9.0..0.x prior to 9.0.0.8 LTS and is therefore affected by a denial of service vulnerability. An unauthenticated, remote attacker can exploit this issue, via an unspecified vector, to cause the application to stop responding.
last seen2020-06-01
modified2020-06-02
plugin id133357
published2020-01-30
reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/133357
titleIBM MQ 8.0.0.x < 8.0.0.14 / 9.0.0.x < 9.0.0.8 LTS Unspecified DoS (CVE-2019-4568)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(133357);
  script_version("1.4");
  script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/19");

  script_cve_id("CVE-2019-4568");
  script_xref(name:"IAVA", value:"2020-A-0047-S");

  script_name(english:"IBM MQ 8.0.0.x < 8.0.0.14 / 9.0.0.x < 9.0.0.8 LTS Unspecified DoS (CVE-2019-4568)");
  script_summary(english:"Checks the version of IBM MQ.");

  script_set_attribute(attribute:"synopsis", value:
"A message queuing service installed on the remote host is affected
by a denial of service vulnerability.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version, the IBM MQ server installed on the
remote host is 8.0.0.x prior to 8.0.0.14 or 9.0..0.x prior to 9.0.0.8 LTS and
is therefore affected by a denial of service vulnerability. An unauthenticated,
remote attacker can exploit this issue, via an unspecified vector, to cause the
application to stop responding.");
  script_set_attribute(attribute:"see_also", value:"https://www.ibm.com/support/pages/node/1106517");
  script_set_attribute(attribute:"see_also", value:"https://exchange.xforce.ibmcloud.com/vulnerabilities/166629");
  script_set_attribute(attribute:"solution", value:
"Upgrade to IBM MQ 8.0.0.14, 9.0.0.8 LTS, or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-4568");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2020/01/24");
  script_set_attribute(attribute:"patch_publication_date", value:"2020/01/24");
  script_set_attribute(attribute:"plugin_publication_date", value:"2020/01/30");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_mq");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("websphere_mq_installed.nasl");
  script_require_keys("installed_sw/IBM WebSphere MQ");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("install_func.inc");

app_name = "IBM WebSphere MQ";
install  = get_single_install(app_name:app_name, exit_if_unknown_ver:TRUE);

version  = install['version'];
path = install['path'];
fix = NULL;
flag = FALSE;


# 8.0.x < 8.0.0.13
if (version =~ "^8\.0\.0\.")
{
  fix = "8.0.0.14";
}
# 9.0.x < 9.0.0.8
else if (version =~ "^9\.0\.0\.")
{
  fix = "9.0.0.8";
}
else
  audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);

if (ver_compare(ver:version, fix:fix, strict:FALSE) == -1)
{
  port = get_kb_item("SMB/transport");
  if (!port) port = 445;
  report =
    '\n  Path              : ' + path +
    '\n  Installed version : ' + version +
    '\n  Fixed version     : ' + fix +
    '\n';
  security_report_v4(port:port, extra:report, severity:SECURITY_WARNING);
}
else audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);