CVE-2014-0859

Severity

50%

Complexity

99%

Confidentiality

48%

The web-server plugin in IBM WebSphere Application Server (WAS) 7.x before 7.0.0.33, 8.x before 8.0.0.9, and 8.5.x before 8.5.5.2, when POST retries are enabled, allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors.

The web-server plugin in IBM WebSphere Application Server (WAS) 7.x before 7.0.0.33, 8.x before 8.0.0.9, and 8.5.x before 8.5.5.2, when POST retries are enabled, allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors.

CVSS 2.0 Base Score 5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).

Overview

Type

IBM WebSphere Application Server

First reported 10 years ago

2014-05-01 17:29:00

Last updated 7 years ago

2017-08-29 01:34:00

Affected Software

IBM WebSphere Application Server 8.0.0.0

8.0.0.0

IBM WebSphere Application Server 8.0.0.1

8.0.0.1

IBM WebSphere Application Server 8.0.0.2 (Fix Pack 2)

8.0.0.2

IBM WebSphere Application Server 8.0.0.3 (Fix Pack 3)

8.0.0.3

IBM WebSphere Application Server 8.0.0.4 (Fix Pack 4)

8.0.0.4

IBM WebSphere Application Server 8.0.0.5 (FixPack 5)

8.0.0.5

IBM WebSphere Application Server 8.0.0.6 (Fix Pack 6)

8.0.0.6

IBM WebSphere Application Server 8.0.0.7 (Fix Pack 7)

8.0.0.7

IBM WebSphere Application Server 8.0.0.8 (Fix Pack 8)

8.0.0.8

IBM WebSphere Application Server 8.5.0.0

8.5.0.0

IBM WebSphere Application Server 8.5.0.1 (Fix Pack 1)

8.5.0.1

IBM WebSphere Application Server 8.5.0.2 (Fix Pack 2)

8.5.0.2

IBM WebSphere Application Server 8.5.5.0

8.5.5.0

IBM WebSphere Application Server 8.5.5.1

8.5.5.1

IBM WebSphere Application Server 7.0

7.0

IBM WebSphere Application Server 7.0.0.1

7.0.0.1

IBM WebSphere Application Server 7.0.0.2

7.0.0.2

IBM WebSphere Application Server 7.0.0.3

7.0.0.3

IBM WebSphere Application Server 7.0.0.4

7.0.0.4

IBM WebSphere Application Server 7.0.0.5

7.0.0.5

IBM WebSphere Application Server 7.0.0.6

7.0.0.6

IBM WebSphere Application Server 7.0.0.7

7.0.0.7

IBM WebSphere Application Server 7.0.0.8

7.0.0.8

IBM WebSphere Application Server 7.0.0.9 (Fix Pack 9)

7.0.0.9

IBM WebSphere Application Server 7.0.0.10 (Fix Pack 10)

7.0.0.10

IBM WebSphere Application Server 7.0.0.11 (Fix Pack 11)

7.0.0.11

IBM WebSphere Application Server 7.0.0.12

7.0.0.12

IBM WebSphere Application Server 7.0.0.13 (Fix Pack 13)

7.0.0.13

IBM WebSphere Application Server 7.0.0.14 (Fix Pack 14)

7.0.0.14

IBM WebSphere Application Server 7.0.0.15 (Fix Pack 15)

7.0.0.15

IBM WebSphere Application Server 7.0.0.16 (Fix Pack 16)

7.0.0.16

IBM WebSphere Application Server 7.0.0.17 (Fix Pack 17)

7.0.0.17

IBM WebSphere Application Server 7.0.0.18 (Fix Pack 18)

7.0.0.18

IBM WebSphere Application Server 7.0.0.19 (Fix Pack 19)

7.0.0.19

IBM WebSphere Application Server 7.0.0.21

7.0.0.21

IBM WebSphere Application Server 7.0.0.22

7.0.0.22

IBM WebSphere Application Server 7.0.0.23

7.0.0.23

IBM WebSphere Application Server 7.0.0.24

7.0.0.24

IBM WebSphere Application Server 7.0.0.25 (Fix Pack 25)

7.0.0.25

IBM WebSphere Application Server 7.0.0.27 (Fix Pack 27)

7.0.0.27

IBM WebSphere Application Server 7.0.0.29 (Fix Pack 29)

7.0.0.29

IBM WebSphere Application Server 7.0.0.31 (Fix Pack 31)

7.0.0.31

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.