Date: 13 November 2012
References: ESB-2012.1044.2 ESB-2012.1116 ESB-2012.1192 ESB-2012.1210 ESB-2013.0057 ESB-2013.0096
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2012.1076
Security Vulnerabilities fixed in IBM WebSphere Application Server 8.0.0.5
13 November 2012
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: IBM WebSphere Application Server
Publisher: IBM
Operating System: AIX
HP-UX
Linux variants
Solaris
Windows
Impact/Access: Overwrite Arbitrary Files -- Remote/Unauthenticated
Denial of Service -- Remote/Unauthenticated
Unauthorised Access -- Remote with User Interaction
Access Confidential Data -- Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2012-3330 CVE-2012-3325 CVE-2012-3311
CVE-2012-3306 CVE-2012-3305 CVE-2012-3304
Reference: ESB-2012.1044
Original Bulletin:
http://www-01.ibm.com/support/docview.wss?uid=swg21615074
- --------------------------BEGIN INCLUDED TEXT--------------------
Security Vulnerabilities fixed in IBM WebSphere Application Server 8.0.0.5
Flash (Alert)
Abstract
Cross reference list for security vulnerabilities fixed in IBM WebSphere
Application Server Fix Pack 8.0.0.5
Content
VULNERABILITY DETAILS:
CVE ID: CVE-2012-3304 (PM54356)
DESCRIPTION: WebSphere Application Server could allow a remote attacker to
hijack a valid users session, caused by an error in the Administrative
Console. An attacker could exploit this vulnerability to gain privileges of
the victim.
CVSS:
CVSS Base Score: 6.8
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/77476 for the
current score CVSS
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:P/I:P/A:P)
AFFECTED PLATFORMS: The following IBM WebSphere Application Server for
distributed operating systems, IBM i operating systems, and z/OS operating
system Versions are affected:
Version 8.5
Version 8
Version 7
Version 6.1
REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical
Fix:
Apply a Fix Pack or PTF containing this APAR PM54356, as noted below:
For IBM WebSphere Application Server :
For V8.5:
o Install Fix Pack 1 (8.5.0.1), or later.
For V8.0 through 8.0.0.4:
o Install Fix Pack 5 (8.0.0.5), or later.
For V7.0 through 7.0.0.23:
o Install Fix Pack 25 (7.0.0.25), or later.
For V6.1.0 through 6.1.0.43:
o Install Fix Pack 45 (6.1.0.45), or later.
Workaround(s): None
Mitigation(s): none
CVE ID: CVE-2012-3311 (PM61388)
DESCRIPTION: WebSphere Application Server, when running on z/OS could allow a
local attacker to bypass security restrictions, caused by a failure to perform
CBIND checks when using Federated Repositories for IIOP connections using
Optimized Local Adapters. An attacker could exploit this vulnerability via a
client application to access or modify application data. CVSS:
CVSS Base Score: 3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/77697 for the
current score CVSS
Environmental Score*: Undefined
CVSS String: (AV:L/AC:M/Au:S/C:P/I:P/A:N)
AFFECTED PLATFORMS: The following IBM WebSphere Application Server for z/OS
operating system Versions are affected:
Version 8.5
Version 8
Version 7
REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical
Fix:
Apply a Fix Pack or PTF containing this APAR PM61388, as noted below:
For IBM WebSphere Application Server
For V8.5 :
o Install Fix Pack 1 (8.5.0.1), or later.
For V8.0 through 8.0.0.4:
o Install Fix Pack 4 (8.0.0.5), or later.
For V7.0 through 7.0.0.23:
o Install Fix Pack 25 (7.0.0.25), or later.
For V6.1.0 through 6.1.0.43:
o Install Fix Pack 45 (6.1.0.45), or later.
Workaround(s): None
Mitigation(s): None
CVE ID: CVE-2012-3305 (PM62467)
DESCRIPTION: WebSphere Application Server could allow a remote attacker to
traverse directories on the system. An attacker could exploit this
vulnerability by deploying a specially-crafted application file to overwrite
files outside of the application deployment directory.
CVSS:
CVSS Base Score: 5.8
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/77477 for the
current score CVSS
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:P)
AFFECTED PLATFORMS: The following IBM WebSphere Application Server for
distributed operating systems, IBM i operating systems, and z/OS operating
system Versions are affected:
Version 8.5
Version 8
Version 7
Version 6.1
REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical
Fix:
Apply a Fix Pack or PTF containing this APAR PM62467, as noted below:
For IBM WebSphere Application Server
For V8.5 :
o Install Fix Pack 1 (8.5.0.1), or later.
For V8.0 through 8.0.0.4:
o Install Fix Pack 5 (8.0.0.5), or later.
For V7.0 through 7.0.0.23:
o Install Fix Pack 25 (7.0.0.25), or later.
For V6.1.0 through 6.1.0.45:
o Install Fix Pack 47 (6.1.0.47), or later (check back for target date)
Workaround(s): None
Mitigation(s): none CVE ID: CVE-2012-3306 (PM66514)
DESCRIPTION: WebSphere Application Server could provide weaker than expected
security caused by a failure to purge passwords from the authentication cache
when multi domain support is enabled.
CVSS:
CVSS Base Score: 4.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/77478 for the
current score CVSS
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:N)
AFFECTED PLATFORMS: The following IBM WebSphere Application Server for
distributed operating systems, IBM i operating systems, and z/OS operating
system Versions are affected:
Version 8.5
Version 8
Version 7
REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for
each named product as soon as practical Fix:
Apply a Fix Pack or PTF containing this APAR PM66514, as noted below:
For IBM WebSphere Application Server :
For V8.5:
o Install Fix Pack 1 (8.5.0.1), or later.
For V8.0 through 8.0.0.4:
o Install Fix Pack 5 (8.0.0.5), or later.
For V7.0 through 7.0.0.23:
o Install Fix Pack 25 (7.0.0.25), or later.
For V6.1.0 through 6.1.0.43:
o Install Fix Pack 45 (6.1.0.45), or later.
Workaround(s): None
Mitigation(s): none CVE ID: CVE-2012-3325 (PM71296)
DESCRIPTION: If you have installed an Interim Fix for PM44303, or a fix pack
containing PM44303, you have the potential for an authenticated attacker to
bypass security restrictions, caused by an error when validating user
credentials. This could allow a user to gain unauthorized administrative
access to an application and potentially gain access to confidential and
critical customer data.
For more information please refer to Flash:
http://www-01.ibm.com/support/docview.wss?uid=swg21609067 CVSS:
CVSS Base Score: 6.0
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/77959 for the
current score CVSS
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:S/C:P/I:P/A:P)
AFFECTED PLATFORMS: The following IBM WebSphere Application Server for
distributed operating systems, IBM i operating systems, and z/OS operating
system Versions are affected:
Version 8.5
Version 8
Version 7
Version 6.1
REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical
Fix:
Apply a Fix Pack or PTF containing this APAR PM71296, as noted below:
For IBM WebSphere Application Server :
For V8.5:
o Install Fix Pack 1 (8.5.0.1), or later.
For V8.0 through 8.0.0.4:
o Install Fix Pack 5 (8.0.0.5), or later.
For V7.0 through 7.0.0.23:
o Install Fix Pack 25 (7.0.0.25), or later.
For V6.1.0 through 6.1.0.43:
o Install Fix Pack 45 (6.1.0.45), or later.
Workaround(s): None
Mitigation(s): none CVE ID: CVE-2012-3330 (PM71319)
DESCRIPTION: WebSphere Application Server and WebSphere Virtual Enterprise are
vulnerable to a denial of service, caused by an error in the proxy server
component. By sending a specially-crafted request, a remote attacker could
exploit this vulnerability to cause the proxy to be marked as down and deny
access to applications.
CVSS:
CVSS Base Score: 5.0
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/78047 for the
current score CVSS
Environmental Score*: Undefined CVSS String: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
AFFECTED PLATFORMS: The following IBM WebSphere Application Server for
distributed operating systems, IBM i operating systems, and z/OS operating
system Versions are affected:
Version 8.5
Version 8
Version 7
REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical
Fix:
Apply a Fix Pack or PTF containing this APAR PM71319, as noted below:
For IBM WebSphere Application Server :
For V8.5:
o Install Fix Pack 1 (8.5.0.1), or later.
For V8.0 through 8.0.0.4:
o Install Fix Pack 5 (8.0.0.5), or later.
For V7.0 through 7.0.0.25:
o Install Fix Pack 27 (7.0.0.27), or later (targeted to be available 21
January 2013).
Workaround(s): None
Mitigation(s): none
REFERENCES: Complete CVSS Guide http://www.first.org/cvss/cvss-guide.html
On-line Calculator V2 http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2
CHANGE HISTORY: 12 November 2012: Original copy published *The CVSS
Environment Score is customer environment specific and will ultimately impact
the Overall CVSS Score. Customers can evaluate the impact of this
vulnerability in their environments by accessing the links in the Reference
section of this Flash.
Note: According to the Forum of Incident Response and Security Teams (FIRST),
the Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
Copyright and trademark information IBM, the IBM logo and ibm.com are
trademarks of International Business Machines Corp., registered in many
jurisdictions worldwide. Other product and service names might be trademarks
of IBM or other companies. A current list of IBM trademarks is available on
the Web at "Copyright and trademark information" at
www.ibm.com/legal/copytrade.shtml.
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQIVAwUBUKHXDu4yVqjM2NGpAQIEHA//S+d3psXy+Ny2WIuHxBoSIKG0vxbtAbxn
qvtDoXoPL/6jWtEnMrVEmBgw/DnPv9PdB2cdRAgUUPVO4Mp/5grUO9WT6ILmPC9f
yPA4v4IfU0UnQU+dQ+ayFQe7f4N43BbQ0pMk0820W2/tpwRYbwv2c8ZvYkV4b5tR
tTsWOBtyR+TOJpmz3kCoQOQLQ63DwpskNA8RmGYyH5mL1UdxmGiNnN/2e7Ebf7/T
LYyoZKPWV7qx61az/pbir8pf2hk3sdVd+u5s/yeizfOFvET7J+K7P4COBq7bn4iq
2VGOIJUfP8Jihms/efQIF7YV6ilXLtBStg1JkhSe2rYqycU5ugojOlwvo5kySRTW
nBWJvgFaKiebZefCqqhc5pnIaSTqo7B3vcvsnkwvHkXPLE+GuWkqtKRLhM06MujC
aqvQJkuyIgmu6zrrQqJG9xJhkWhxRsIDQqjjJMqnxOrfgXBCt2EEmx/kd4J1w5UD
nX5e968bcKYfOhHVSjlLB6bSKokZaXrPeAPCO/DS5Tcwp0j6kpwUAfteCAn+2tZ5
0ya38YmJeDWGrCkoFGGNgdMILTjZ9PVaEE+ebjUr2Kkw+5KUM0do+OvedFNpgnd/
8rXvQF7mX5vnJejPZmtYi/lPL/eohM//vb9FEJJSZZUD0vRML0sBXWBPn98Skkx/
N1c/+e+gVF0=
=cUBP
-----END PGP SIGNATURE-----
|