CVE-2014-6092CVE-2014-6092

Affected configuration(s):

cpe:/a:ibm:curam_social_program_management:5.2:sp6
cpe:/a:ibm:curam_social_program_management:6.0.4.0
cpe:/a:ibm:curam_social_program_management:6.0.4.1
cpe:/a:ibm:curam_social_program_management:6.0.4.2
cpe:/a:ibm:curam_social_program_management:6.0.4.3
cpe:/a:ibm:curam_social_program_management:6.0.4.4
cpe:/a:ibm:curam_social_program_management:6.0.4.5
cpe:/a:ibm:curam_social_program_management:6.0.5.0
cpe:/a:ibm:curam_social_program_management:6.0.5.1
cpe:/a:ibm:curam_social_program_management:6.0.5.2
cpe:/a:ibm:curam_social_program_management:6.0.5.3
cpe:/a:ibm:curam_social_program_management:6.0.5.4
cpe:/a:ibm:curam_social_program_management:6.0.5.5

Date published: 2015-04-27T07:59:02.433-04:00

Date last modified: 2015-04-27T13:46:00.623-04:00

CVSS Score: 5.0

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://www-01.ibm.com/support/docview.wss?uid=swg21697742

Summary: IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause a denial of service (web-service outage) by making many login attempts with a valid caseworker account name.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.