CVE-2015-5012
15.02.2016, 02:59
The SSH implementation on IBM Security Access Manager for Web appliances 7.0 before 7.0.0 FP19, 8.0 before 8.0.1.3 IF3, and 9.0 before 9.0.0.0 IF1 does not properly restrict the set of MAC algorithms, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.Enginsight
Vendor | Product | Version |
---|---|---|
ibm | security_access_manager_9.0_firmware | 9.0.0 |
ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.1 |
ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.2 |
ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.3 |
ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.4 |
ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.5 |
ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.6 |
ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.7 |
ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.8 |
ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.9 |
ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.10 |
ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.11 |
ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.12 |
ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.13 |
ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.14 |
ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.15 |
ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.16 |
ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.17 |
ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.18 |
ibm | security_access_manager_for_web_8.0_firmware | 8.0.0.1 |
ibm | security_access_manager_for_web_8.0_firmware | 8.0.0.2 |
ibm | security_access_manager_for_web_8.0_firmware | 8.0.0.3 |
ibm | security_access_manager_for_web_8.0_firmware | 8.0.0.5 |
ibm | security_access_manager_for_web_8.0_firmware | 8.0.1 |
ibm | security_access_manager_for_web_8.0_firmware | 8.0.1.0 |
ibm | security_access_manager_for_web_8.0_firmware | 8.0.1.2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References