Vulnerability Name:

CVE-2017-7657 (CCN-145521)

Assigned:2017-04-11
Published:2018-06-25
Updated:2021-07-20
Summary:In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.
CVSS v3 Severity:9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-190
CWE-444
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2017-7657

Source: CCN
Type: Jetty Mailing List, Mon, 25 Jun 2018 12:17:08 -0400
Jetty CVE Announcement - June 2018

Source: CCN
Type: Eclipse Web site
Eclipse Jetty

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1041194

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:0910

Source: CONFIRM
Type: Third Party Advisory
https://bugs.eclipse.org/bugs/show_bug.cgi?id=535668

Source: XF
Type: UNKNOWN
eclipse-cve20177657-request-smuggling(145521)

Source: MLIST
Type: Mailing List, Third Party Advisory
[activemq-issues] 20190820 [jira] [Created] (AMQ-7279) Security Vulnerabilities in Libraries - jackson-databind-2.9.8.jar, tomcat-servlet-api-8.0.53.jar, tomcat-websocket-api-8.0.53.jar, zookeeper-3.4.6.jar, guava-18.0.jar, jetty-all-9.2.26.v20180806.jar, scala-library-2.11.0.jar

Source: MLIST
Type: Mailing List, Third Party Advisory
[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report

Source: MLIST
Type: Mailing List, Third Party Advisory
[druid-commits] 20191115 [GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities

Source: MLIST
Type: Mailing List, Third Party Advisory
[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image

Source: MLIST
Type: UNKNOWN
[druid-commits] 20210304 [GitHub] [druid] suneet-s commented on issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty

Source: MLIST
Type: UNKNOWN
[druid-commits] 20210304 [GitHub] [druid] suneet-s closed issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty

Source: MLIST
Type: Mailing List, Third Party Advisory
[druid-commits] 20210226 [GitHub] [druid] kingnj opened a new issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty

Source: CONFIRM
Type: Patch, Third Party Advisory
https://security.netapp.com/advisory/ntap-20181014-0001/

Source: CONFIRM
Type: Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us

Source: DEBIAN
Type: Third Party Advisory
DSA-4278

Source: CCN
Type: IBM Security Bulletin 0728823 (Sterling B2B Integrator)
Multiple Security Vulnerabilities in Jetty Affect IBM Sterling B2B Integrator

Source: CCN
Type: IBM Security Bulletin 732816 (InfoSphere Information Server)
Vulnerabilities in Eclipse Jetty affect the IBM InfoSphere Information Server installers

Source: CCN
Type: IBM Security Bulletin 733987 (Netcool Agile Service Manager)
IBM Netcool Agile Service Manager is affected by Eclipse Jetty vulnerabilities

Source: CCN
Type: IBM Security Bulletin 0792111 (Sterling Secure Proxy)
Multiple Vulnerabilities affect IBM Sterling Secure Proxy

Source: CCN
Type: IBM Security Bulletin 792117 (Sterling Secure Proxy)
Multiple Vulnerabilities affect IBM Sterling External Authentication Server

Source: CCN
Type: IBM Security Bulletin 794721 (UrbanCode Deploy)
Publicly Disclosed Vulnerability Found By vFinder (CVE-2017-7656, CVE-2017-7657, CVE-2017-7658, CVE-2018-12536)

Source: CCN
Type: IBM Security Bulletin 6202751 (eDiscovery Analyzer)
Publicly disclosed vulnerability found by vFinder in IBM eDiscovery Analyzer

Source: CCN
Type: IBM Security Bulletin 6320063 (Security Guardium Insights)
IBM Security Guardium Insights is affected by a Components with known vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6320835 (Security Guardium Data Encryption)
Multiple Vulnerabilities in IBM Guardium Data Encryption (GDE)

Source: CCN
Type: IBM Security Bulletin 6344071 (QRadar SIEM)
IBM QRadar SIEM is vulnerable to Using Components with Known Vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6466729 (Cognos Analytics)
IBM Cognos Analytics has addressed multiple vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6602025 (Tivoli Netcool/OMNIbus)
Tivoli Netcool/Omnibus installation contains vulnerable Eclipse Jetty code libraries (Multiple CVEs)

Source: CCN
Type: IBM Security Bulletin 6621343 (Control Desk)
Provision to add https and Secure Flag to bayeux_browser cookie for IBM Control Desk.

Source: CCN
Type: IBM Security Bulletin 6830869 (Enterprise Records)
Vulnerability found in Eclipse Jetty may affect IBM Enterprise Records

Source: CCN
Type: IBM Security Bulletin 6854577 (Security Verify Governance)
IBM Security Verify Governance is vulnerable to multiple vulnerabilities due to Eclipse Jetty

Source: CCN
Type: IBM Security Bulletin 6983274 (Cognos Command Center)
IBM Cognos Command Center is affected by multiple vulnerabilities

Source: CCN
Type: IBM Security Bulletin 7005945 (Storage Protect)
IBM Storage Protect Server is vulnerable to various attacks due to Eclipse jetty

Source: MISC
Type: Patch, Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html

Source: MISC
Type: Patch, Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2017-7657

Vulnerable Configuration:Configuration 1:
  • cpe:/a:eclipse:jetty:*:*:*:*:*:*:*:* (Version >= 9.3.0 and < 9.3.24)
  • OR cpe:/a:eclipse:jetty:*:*:*:*:*:*:*:* (Version >= 9.4.0 and < 9.4.11)
  • OR cpe:/a:eclipse:jetty:*:*:*:*:*:*:*:* (Version <= 9.2.26)

  • Configuration 2:
  • cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:netapp:hci_storage_nodes:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:* (Version >= 11.0 and <= 11.50.1)
  • OR cpe:/a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:* (Version < 5.2.4)
  • OR cpe:/a:netapp:snap_creator_framework:*:*:*:*:*:*:*:* (Version < 4.3.3)
  • OR cpe:/a:netapp:snapcenter:*:*:*:*:*:*:*:* (Version < 4.1p3)
  • OR cpe:/a:netapp:snapmanager:*:*:*:*:*:sap:*:* (Version < 3.4.2)
  • OR cpe:/a:netapp:snapmanager:*:*:*:*:*:oracle:*:* (Version < 3.4.2)
  • OR cpe:/a:netapp:e-series_santricity_management:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:e-series_santricity_web_services:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:element_software:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:element_software_management_node:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:santricity_cloud_connector:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:oncommand_system_manager:3.x:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:hp:xp_p9000_command_view:*:*:*:*:advanced:*:*:* (Version >= 8.4.0-00 and < 8.6.2-00)
  • AND
  • cpe:/h:hp:xp_p9000:-:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/a:oracle:rest_data_services:11.2.0.4:*:*:*:-:*:*:*
  • OR cpe:/a:oracle:rest_data_services:12.1.0.2:*:*:*:-:*:*:*
  • OR cpe:/a:oracle:rest_data_services:12.2.0.1:*:*:*:-:*:*:*
  • OR cpe:/a:oracle:rest_data_services:18c:*:*:*:-:*:*:*
  • OR cpe:/a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:retail_xstore_point_of_service:15.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:retail_xstore_point_of_service:16.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:retail_xstore_point_of_service:17.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:eclipse:jetty:9.4.0:20180619:*:*:*:*:*:*
  • OR cpe:/a:eclipse:jetty:9.2.0:20140526:*:*:*:*:*:*
  • OR cpe:/a:eclipse:jetty:9.3.0:20150612:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:infosphere_information_server:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:-:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:11.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_netcool/omnibus:8.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_secure_proxy:3.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:11.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.1.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_secure_proxy:3.4.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_analytics:11.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.3.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.3.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.7.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:5.2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:5.2.6.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.7.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:netcool_agile_service_manager:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:netcool_agile_service_manager:1.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.7.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:7.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:7.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:7.0.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:7.0.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_command_center:10.2.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_analytics:11.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium_insights:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium_data_encryption:3.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.3.3:p4:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.4.0:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.4.1:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_verify_governance:10.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:control_desk:7.6.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.xenial:def:201776570000000
    V
    CVE-2017-7657 on Ubuntu 16.04 LTS (xenial) - low.
    2018-06-26
    oval:com.ubuntu.artful:def:20177657000
    V
    CVE-2017-7657 on Ubuntu 17.10 (artful) - medium.
    2018-06-26
    oval:com.ubuntu.xenial:def:20177657000
    V
    CVE-2017-7657 on Ubuntu 16.04 LTS (xenial) - low.
    2018-06-26
    oval:com.ubuntu.disco:def:201776570000000
    V
    CVE-2017-7657 on Ubuntu 19.04 (disco) - low.
    2018-06-26
    oval:com.ubuntu.bionic:def:20177657000
    V
    CVE-2017-7657 on Ubuntu 18.04 LTS (bionic) - low.
    2018-06-26
    oval:com.ubuntu.cosmic:def:201776570000000
    V
    CVE-2017-7657 on Ubuntu 18.10 (cosmic) - low.
    2018-06-26
    oval:com.ubuntu.cosmic:def:20177657000
    V
    CVE-2017-7657 on Ubuntu 18.10 (cosmic) - low.
    2018-06-26
    oval:com.ubuntu.bionic:def:201776570000000
    V
    CVE-2017-7657 on Ubuntu 18.04 LTS (bionic) - low.
    2018-06-26
    oval:com.ubuntu.trusty:def:20177657000
    V
    CVE-2017-7657 on Ubuntu 14.04 LTS (trusty) - low.
    2018-06-26
    BACK
    eclipse jetty *
    eclipse jetty *
    eclipse jetty *
    debian debian linux 9.0
    netapp hci storage nodes -
    netapp e-series santricity os controller *
    netapp oncommand unified manager *
    netapp snap creator framework *
    netapp snapcenter *
    netapp snapmanager *
    netapp snapmanager *
    netapp e-series santricity management -
    netapp e-series santricity web services -
    netapp element software -
    netapp element software management node -
    netapp santricity cloud connector -
    netapp oncommand system manager 3.x
    hp xp p9000 command view *
    hp xp p9000 -
    oracle rest data services 11.2.0.4
    oracle rest data services 12.1.0.2
    oracle rest data services 12.2.0.1
    oracle rest data services 18c
    oracle retail xstore point of service 7.1
    oracle retail xstore point of service 15.0
    oracle retail xstore point of service 16.0
    oracle retail xstore point of service 17.0
    eclipse jetty 9.4.0 20180619
    eclipse jetty 9.2.0 20140526
    eclipse jetty 9.3.0 20150612
    ibm infosphere information server 9.1
    ibm sterling b2b integrator -
    ibm urbancode deploy 6.1.0.2
    ibm infosphere information server 11.3
    ibm tivoli netcool/omnibus 8.1.0
    ibm urbancode deploy 6.1
    ibm urbancode deploy 6.1.0.1
    ibm urbancode deploy 6.1.0.3
    ibm sterling secure proxy 3.4.2
    ibm urbancode deploy 6.1.0.4
    ibm urbancode deploy 6.1.1
    ibm urbancode deploy 6.1.1.1
    ibm urbancode deploy 6.1.1.2
    ibm urbancode deploy 6.1.1.3
    ibm urbancode deploy 6.1.1.4
    ibm urbancode deploy 6.1.1.5
    ibm urbancode deploy 6.1.1.6
    ibm urbancode deploy 6.1.1.7
    ibm urbancode deploy 6.1.2
    ibm infosphere information server 11.5
    ibm urbancode deploy 6.1.1.8
    ibm urbancode deploy 6.1.3
    ibm urbancode deploy 6.1.3.1
    ibm urbancode deploy 6.2
    ibm urbancode deploy 6.2.0.1
    ibm urbancode deploy 6.1.3.2
    ibm urbancode deploy 6.2.0.2
    ibm urbancode deploy 6.2.1
    ibm sterling secure proxy 3.4.3
    ibm urbancode deploy 6.2.1.1
    ibm urbancode deploy 6.1.3.3
    ibm urbancode deploy 6.2.1.2
    ibm urbancode deploy 6.2.2
    ibm cognos analytics 11.0
    ibm urbancode deploy 6.2.2.1
    ibm urbancode deploy 6.2.3.0
    ibm urbancode deploy 6.2.3.1
    ibm urbancode deploy 6.1.3.4
    ibm urbancode deploy 6.1.3.5
    ibm urbancode deploy 6.2.4
    ibm urbancode deploy 6.1.3.6
    ibm urbancode deploy 6.2.4.1
    ibm urbancode deploy 6.2.4.2
    ibm urbancode deploy 6.2.5.1
    ibm infosphere information server 11.7
    ibm urbancode deploy 6.1.3.7
    ibm urbancode deploy 6.1.3.8
    ibm urbancode deploy 6.2.6.0
    ibm urbancode deploy 6.2.6.1
    ibm urbancode deploy 6.2.7.0
    ibm sterling b2b integrator 5.2.0.1
    ibm sterling b2b integrator 5.2.6.3
    ibm urbancode deploy 6.2.7.1
    ibm urbancode deploy 6.2.7.2
    ibm netcool agile service manager 1.1.1
    ibm netcool agile service manager 1.1.2
    ibm qradar security information and event manager 7.3.0
    ibm urbancode deploy 6.2.5.0
    ibm urbancode deploy 6.2.7.3
    ibm urbancode deploy 7.0.0.0
    ibm urbancode deploy 7.0.0.1
    ibm urbancode deploy 7.0.1.0
    ibm urbancode deploy 7.0.1.1
    ibm cognos command center 10.2.4.1
    ibm cognos analytics 11.1
    ibm security guardium insights 2.0.1
    ibm security guardium data encryption 3.0.0.2
    ibm qradar security information and event manager 7.3.3 p4
    ibm qradar security information and event manager 7.4.0
    ibm qradar security information and event manager 7.4.1 -
    ibm security verify governance 10.0
    ibm control desk 7.6.1