CVE-2011-1820
Vulnerability from cvelistv5
Published
2011-04-21 10:00
Modified
2024-08-06 22:37
Severity ?
EPSS score ?
Summary
IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010, 6.0 before 6.0.0.67 (aka 6.0.0.8-TIV-ITDS-IF0009), 6.1 before 6.1.0.40 (aka 6.1.0.5-TIV-ITDS-IF0003), 6.2 before 6.2.0.16 (aka 6.2.0.3-TIV-ITDS-IF0002), and 6.3 before 6.3.0.3 (aka 6.3.0.0-TIV-ITDS-IF0003) does not properly handle the ibm-auditAttributesOnGroupEvalOp setting for auditing of extended operations, which might allow attackers to obtain sensitive information by reading the audit log.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:25.825Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg24029659" }, { "name": "44184", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44184" }, { "name": "IO14025", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14025" }, { "name": "IO14044", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14044" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg24029660" }, { "name": "IO14023", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14023" }, { "name": "IO14043", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14043" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg24029661" }, { "name": "IO14028", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14028" }, { "name": "1025358", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1025358" }, { "name": "ibm-tds-proxyserver-info-disclosure(66712)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66712" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg21496086" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010, 6.0 before 6.0.0.67 (aka 6.0.0.8-TIV-ITDS-IF0009), 6.1 before 6.1.0.40 (aka 6.1.0.5-TIV-ITDS-IF0003), 6.2 before 6.2.0.16 (aka 6.2.0.3-TIV-ITDS-IF0002), and 6.3 before 6.3.0.3 (aka 6.3.0.0-TIV-ITDS-IF0003) does not properly handle the ibm-auditAttributesOnGroupEvalOp setting for auditing of extended operations, which might allow attackers to obtain sensitive information by reading the audit log." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg24029659" }, { "name": "44184", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44184" }, { "name": "IO14025", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14025" }, { "name": "IO14044", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14044" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg24029660" }, { "name": "IO14023", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14023" }, { "name": "IO14043", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14043" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg24029661" }, { "name": "IO14028", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14028" }, { "name": "1025358", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1025358" }, { "name": "ibm-tds-proxyserver-info-disclosure(66712)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66712" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg21496086" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1820", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010, 6.0 before 6.0.0.67 (aka 6.0.0.8-TIV-ITDS-IF0009), 6.1 before 6.1.0.40 (aka 6.1.0.5-TIV-ITDS-IF0003), 6.2 before 6.2.0.16 (aka 6.2.0.3-TIV-ITDS-IF0002), and 6.3 before 6.3.0.3 (aka 6.3.0.0-TIV-ITDS-IF0003) does not properly handle the ibm-auditAttributesOnGroupEvalOp setting for auditing of extended operations, which might allow attackers to obtain sensitive information by reading the audit log." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.ibm.com/support/docview.wss?uid=swg24029659", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg24029659" }, { "name": "44184", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44184" }, { "name": "IO14025", "refsource": "AIXAPAR", "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14025" }, { "name": "IO14044", "refsource": "AIXAPAR", "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14044" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg24029660", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg24029660" }, { "name": "IO14023", "refsource": "AIXAPAR", "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14023" }, { "name": "IO14043", "refsource": "AIXAPAR", "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14043" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg24029672", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg24029672" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg24029661", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg24029661" }, { "name": "IO14028", "refsource": "AIXAPAR", "url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14028" }, { "name": "1025358", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1025358" }, { "name": "ibm-tds-proxyserver-info-disclosure(66712)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66712" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg21496086", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg21496086" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg24029663", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg24029663" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-1820", "datePublished": "2011-04-21T10:00:00", "dateReserved": "2011-04-20T00:00:00", "dateUpdated": "2024-08-06T22:37:25.825Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35E1DF05-5CE8-4782-9F65-B01464985908\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:5.2.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93A91233-1C83-487F-9BD6-6CEAE6303A8A\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EF905E9-DDA5-4369-AC6C-FD6E2573E667\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04980717-662D-4BB1-B52E-65ED0773080A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"08B63191-A886-445B-8DF7-DAFB60F32343\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AD57EC4-40A8-432F-B3B0-96941779B96A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"574CF7FC-A438-468B-9B4C-4355005D363F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF13A015-1EED-4BB1-97CF-84CF67A2D74B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1C81618-2FD8-49B1-9864-4A1C7501A162\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92805FE4-9E5A-4366-8AB9-C846A355E9E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1BB961FA-0305-4D2B-90A1-BE63903D16AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.45:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B29CF8D-410F-4FF7-BAB3-7541E7C1EA5E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E435108-AEE8-4FB3-BD46-E34B3E1E8F2A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECF9F5BF-FE5A-403E-A661-04673F5390A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E857FD0-DCD1-4194-8F08-500B118088FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.55:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"460ADE05-414D-4870-A192-AA66911B71F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.56:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C9DA0B9-4554-4B06-B55E-08401CFD84D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.57:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7643F50F-4A2E-45F4-A12A-D5F1E3A10C4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.58:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE7B4F0B-0801-4808-A849-466753701523\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.59:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE04E834-CC79-405D-B885-C56192F0038C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F11078B5-078C-4069-8288-B8A34D2635DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58360839-9020-4567-B60B-5CBFC815E440\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.62:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90BA24A5-1848-4E2B-85D5-8CDD402F27A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.63:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85E68335-7E15-4D94-8384-9292831E152A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.64:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66F9F849-EB1F-4A8C-A3F3-9662241037C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.65:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8AE41FA-98E4-4552-9658-7DAF605C4D29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.66:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECB37C65-CC59-4CB4-8A74-6634FF410345\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F468434-0317-435A-B2A6-5923A88A090F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E79197BC-3BDF-4F38-B63F-1B2A658B645F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7B1402A-B3C3-4210-928F-6EFCCE2DE1CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92D48F0B-C9E2-4381-8463-83FF47136EB8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36308D0C-D92C-4857-A857-097F383EE76C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A84CEB80-796F-4928-A2A0-73E604543A70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"462385FC-F345-42EE-ABF0-E1781CC648A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F10F3910-5616-41A2-A3BF-18FA4DD68631\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51C34738-5F9B-43A7-987F-EB805B31119E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AA93B63-9D15-4784-8585-DBC139A382E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55D84E30-1F23-4A6A-B622-78DBEEBEFB46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50C9A7DF-6968-41CC-911A-B746CB43AA82\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EA493E1-F791-4FE5-9F7E-36CAC0D942C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7365156-4EA3-476A-A395-FADEDF1BA80A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"321B15BC-2653-4B64-A5AE-9FCA6A08713C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A1B527B-E07D-4543-92A6-0EE58CB8FECC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CDBA9D2-E683-431A-B06C-5CCA55E44EA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EF4AFCB-755A-40E9-AB2B-4FDFD10B0388\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86556AFA-F4F5-4C29-B59D-DC5281375E07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E16D75E-7678-48AF-AA2D-33C167ACC99E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBB97A26-E8A9-418C-87C9-F4837BF6680A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AFFA6A4C-8EE2-4898-9AEB-CA5EBE4BC5E9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3922010D-4867-402C-9EC5-98FDEB281EA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBC6C026-A23F-4A12-BE0C-3333B9D5A0DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"297D92F4-51B0-4DC0-B872-984AD0A6008F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B93E759-1B76-421D-9684-F6FF77A99E6C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"344605B3-15C9-4E36-A22B-7EBC1207A03E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F15D60CA-8B3C-48D7-A860-1B72BCA14CFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD03B74B-E234-4757-8D98-896DEA4CED7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BAF9CDD0-3F78-4489-A18D-40A1FAF705F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CBF6D03-9A58-477D-B5D0-030A373A58AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C7636BE-22BB-44C3-B303-9780E2A24487\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E4E6E83-914D-467F-9EEA-56669B95CCAD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38BBCED9-4260-40DC-A9A6-40CDB09BA92E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D297D508-ACC2-41E7-B3F5-5AEDFE3E2453\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.36:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBD3BA3E-E015-4CB7-B686-19F45F8221C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90F615EC-7530-468D-B62E-B07A1FE0431B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E278A8E-D7B6-450C-92D6-9955B22E18C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB9D85F4-1019-419D-8769-B1636385384C\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"653551D3-88A3-4E69-A1B1-64326BEF1F18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CBAF2E5-4931-41AF-BCDA-D769B06FB05E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98186E56-0F75-4306-9E34-A388EA2FD6C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FC2A00D-4A9E-4BB7-81E6-A0D3A8434EA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0CB6BE6-C851-4C31-A016-CCD4937277D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2260260B-B69E-4B59-A0D1-1F71B92ABDFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8BFF1C8-8AEA-43FC-B76C-F4A44A713F9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E08631DE-72C4-462B-9763-41783EA8963C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50315494-8C1B-436B-8E24-8B8CA565FB17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2759F8BC-8400-4AB1-81DD-51BD69BB720E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EEEB330D-5FC6-424B-85EF-06A56329FFEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3588C1D0-3C8F-4C7A-A7F7-94EE51FA7ECF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33DE5E95-BA4A-42A2-B376-373331D9934E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D5D35E5-AFBE-4D90-9E89-9251C45CF0DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B87492D7-D0C6-4E4A-87B3-F44BC3149101\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D48029C-3455-46A6-A8CA-8013A167979B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D872267B-B01D-4723-A522-8CDF684CB980\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2234E088-31ED-4BBF-94C5-131E3B0CB994\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010, 6.0 before 6.0.0.67 (aka 6.0.0.8-TIV-ITDS-IF0009), 6.1 before 6.1.0.40 (aka 6.1.0.5-TIV-ITDS-IF0003), 6.2 before 6.2.0.16 (aka 6.2.0.3-TIV-ITDS-IF0002), and 6.3 before 6.3.0.3 (aka 6.3.0.0-TIV-ITDS-IF0003) does not properly handle the ibm-auditAttributesOnGroupEvalOp setting for auditing of extended operations, which might allow attackers to obtain sensitive information by reading the audit log.\"}, {\"lang\": \"es\", \"value\": \"IBM Tivoli Directory Server (TDS) v5.2 anteriores a v5.2.0.5-TIV-ITDS-IF0010, v6.0 anteriores a v6.0.0.67 (tambi\\u00e9n conocido como v6.0.0.8-TIV-ITDS-IF0009), v6.1 anteriores a v6.1.0.40 (tambi\\u00e9n conocido como 6.1.0.5-TIV-ITDS-IF0003), v6.2 anteriores a v6.2.0.16 (tambi\\u00e9n conocido como v6.2.0.3-TIV-ITDS-IF0002), y v6.3 anteriores a v6.3.0.3 (tambi\\u00e9n conocido como v6.3.0.0-TIV-ITDS-IF0003)no manejar adecuadamente el valor ibm-auditAttributesOnGroupEvalOp para la auditor\\u00eda de las operaciones extendidas, lo que podr\\u00eda permitir a atacantes obtener informaci\\u00f3n sensible mediante la lectura del registro de auditor\\u00eda.\"}]", "id": "CVE-2011-1820", "lastModified": "2024-11-21T01:27:06.660", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:S/C:P/I:N/A:N\", \"baseScore\": 1.7, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.1, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2011-04-21T10:55:02.670", "references": "[{\"url\": \"http://secunia.com/advisories/44184\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securitytracker.com/id?1025358\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=swg1IO14023\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=swg1IO14025\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=swg1IO14028\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=swg1IO14043\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=swg1IO14044\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=swg21496086\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=swg24029659\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=swg24029660\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=swg24029661\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=swg24029663\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=swg24029672\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/66712\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/44184\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securitytracker.com/id?1025358\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=swg1IO14023\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=swg1IO14025\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=swg1IO14028\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=swg1IO14043\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=swg1IO14044\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=swg21496086\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=swg24029659\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=swg24029660\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=swg24029661\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=swg24029663\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=swg24029672\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/66712\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2011-1820\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-04-21T10:55:02.670\",\"lastModified\":\"2024-11-21T01:27:06.660\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010, 6.0 before 6.0.0.67 (aka 6.0.0.8-TIV-ITDS-IF0009), 6.1 before 6.1.0.40 (aka 6.1.0.5-TIV-ITDS-IF0003), 6.2 before 6.2.0.16 (aka 6.2.0.3-TIV-ITDS-IF0002), and 6.3 before 6.3.0.3 (aka 6.3.0.0-TIV-ITDS-IF0003) does not properly handle the ibm-auditAttributesOnGroupEvalOp setting for auditing of extended operations, which might allow attackers to obtain sensitive information by reading the audit log.\"},{\"lang\":\"es\",\"value\":\"IBM Tivoli Directory Server (TDS) v5.2 anteriores a v5.2.0.5-TIV-ITDS-IF0010, v6.0 anteriores a v6.0.0.67 (tambi\u00e9n conocido como v6.0.0.8-TIV-ITDS-IF0009), v6.1 anteriores a v6.1.0.40 (tambi\u00e9n conocido como 6.1.0.5-TIV-ITDS-IF0003), v6.2 anteriores a v6.2.0.16 (tambi\u00e9n conocido como v6.2.0.3-TIV-ITDS-IF0002), y v6.3 anteriores a v6.3.0.3 (tambi\u00e9n conocido como v6.3.0.0-TIV-ITDS-IF0003)no manejar adecuadamente el valor ibm-auditAttributesOnGroupEvalOp para la auditor\u00eda de las operaciones extendidas, lo que podr\u00eda permitir a atacantes obtener informaci\u00f3n sensible mediante la lectura del registro de auditor\u00eda.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:S/C:P/I:N/A:N\",\"baseScore\":1.7,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.1,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35E1DF05-5CE8-4782-9F65-B01464985908\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:5.2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93A91233-1C83-487F-9BD6-6CEAE6303A8A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EF905E9-DDA5-4369-AC6C-FD6E2573E667\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04980717-662D-4BB1-B52E-65ED0773080A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08B63191-A886-445B-8DF7-DAFB60F32343\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AD57EC4-40A8-432F-B3B0-96941779B96A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"574CF7FC-A438-468B-9B4C-4355005D363F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF13A015-1EED-4BB1-97CF-84CF67A2D74B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1C81618-2FD8-49B1-9864-4A1C7501A162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92805FE4-9E5A-4366-8AB9-C846A355E9E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BB961FA-0305-4D2B-90A1-BE63903D16AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B29CF8D-410F-4FF7-BAB3-7541E7C1EA5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E435108-AEE8-4FB3-BD46-E34B3E1E8F2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECF9F5BF-FE5A-403E-A661-04673F5390A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E857FD0-DCD1-4194-8F08-500B118088FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"460ADE05-414D-4870-A192-AA66911B71F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C9DA0B9-4554-4B06-B55E-08401CFD84D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7643F50F-4A2E-45F4-A12A-D5F1E3A10C4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE7B4F0B-0801-4808-A849-466753701523\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE04E834-CC79-405D-B885-C56192F0038C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F11078B5-078C-4069-8288-B8A34D2635DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58360839-9020-4567-B60B-5CBFC815E440\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90BA24A5-1848-4E2B-85D5-8CDD402F27A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85E68335-7E15-4D94-8384-9292831E152A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F9F849-EB1F-4A8C-A3F3-9662241037C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.65:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8AE41FA-98E4-4552-9658-7DAF605C4D29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.66:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECB37C65-CC59-4CB4-8A74-6634FF410345\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F468434-0317-435A-B2A6-5923A88A090F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E79197BC-3BDF-4F38-B63F-1B2A658B645F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7B1402A-B3C3-4210-928F-6EFCCE2DE1CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92D48F0B-C9E2-4381-8463-83FF47136EB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36308D0C-D92C-4857-A857-097F383EE76C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A84CEB80-796F-4928-A2A0-73E604543A70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"462385FC-F345-42EE-ABF0-E1781CC648A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F10F3910-5616-41A2-A3BF-18FA4DD68631\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51C34738-5F9B-43A7-987F-EB805B31119E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AA93B63-9D15-4784-8585-DBC139A382E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55D84E30-1F23-4A6A-B622-78DBEEBEFB46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50C9A7DF-6968-41CC-911A-B746CB43AA82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EA493E1-F791-4FE5-9F7E-36CAC0D942C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7365156-4EA3-476A-A395-FADEDF1BA80A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"321B15BC-2653-4B64-A5AE-9FCA6A08713C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A1B527B-E07D-4543-92A6-0EE58CB8FECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CDBA9D2-E683-431A-B06C-5CCA55E44EA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EF4AFCB-755A-40E9-AB2B-4FDFD10B0388\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86556AFA-F4F5-4C29-B59D-DC5281375E07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E16D75E-7678-48AF-AA2D-33C167ACC99E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBB97A26-E8A9-418C-87C9-F4837BF6680A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFFA6A4C-8EE2-4898-9AEB-CA5EBE4BC5E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3922010D-4867-402C-9EC5-98FDEB281EA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBC6C026-A23F-4A12-BE0C-3333B9D5A0DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"297D92F4-51B0-4DC0-B872-984AD0A6008F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B93E759-1B76-421D-9684-F6FF77A99E6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"344605B3-15C9-4E36-A22B-7EBC1207A03E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F15D60CA-8B3C-48D7-A860-1B72BCA14CFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD03B74B-E234-4757-8D98-896DEA4CED7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAF9CDD0-3F78-4489-A18D-40A1FAF705F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CBF6D03-9A58-477D-B5D0-030A373A58AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C7636BE-22BB-44C3-B303-9780E2A24487\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E4E6E83-914D-467F-9EEA-56669B95CCAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38BBCED9-4260-40DC-A9A6-40CDB09BA92E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D297D508-ACC2-41E7-B3F5-5AEDFE3E2453\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBD3BA3E-E015-4CB7-B686-19F45F8221C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90F615EC-7530-468D-B62E-B07A1FE0431B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E278A8E-D7B6-450C-92D6-9955B22E18C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB9D85F4-1019-419D-8769-B1636385384C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"653551D3-88A3-4E69-A1B1-64326BEF1F18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CBAF2E5-4931-41AF-BCDA-D769B06FB05E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98186E56-0F75-4306-9E34-A388EA2FD6C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FC2A00D-4A9E-4BB7-81E6-A0D3A8434EA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0CB6BE6-C851-4C31-A016-CCD4937277D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2260260B-B69E-4B59-A0D1-1F71B92ABDFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8BFF1C8-8AEA-43FC-B76C-F4A44A713F9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E08631DE-72C4-462B-9763-41783EA8963C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50315494-8C1B-436B-8E24-8B8CA565FB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2759F8BC-8400-4AB1-81DD-51BD69BB720E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEEB330D-5FC6-424B-85EF-06A56329FFEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3588C1D0-3C8F-4C7A-A7F7-94EE51FA7ECF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33DE5E95-BA4A-42A2-B376-373331D9934E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D5D35E5-AFBE-4D90-9E89-9251C45CF0DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B87492D7-D0C6-4E4A-87B3-F44BC3149101\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D48029C-3455-46A6-A8CA-8013A167979B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D872267B-B01D-4723-A522-8CDF684CB980\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2234E088-31ED-4BBF-94C5-131E3B0CB994\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/44184\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1025358\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg1IO14023\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg1IO14025\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg1IO14028\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg1IO14043\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg1IO14044\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg21496086\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg24029659\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg24029660\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg24029661\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg24029663\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg24029672\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/66712\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/44184\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1025358\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg1IO14023\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg1IO14025\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg1IO14028\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg1IO14043\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg1IO14044\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg21496086\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg24029659\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg24029660\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg24029661\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg24029663\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg24029672\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/66712\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.