copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2012.0057 - [Win][Linux][Solaris][AIX] IBM WebSphere Application Server Community Edition: Denial of service - Remote with user interaction

Date: 12 January 2012

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2012.0057
          Denial of service vulnerability in the web container of
              WebSphere Application Server Community Edition
                              12 January 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM WebSphere Application Server Community Edition
Publisher:         IBM
Operating System:  AIX
                   Linux variants
                   Solaris
                   Windows
Impact/Access:     Denial of Service -- Remote with User Interaction
Resolution:        Patch/Upgrade

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21577274

- --------------------------BEGIN INCLUDED TEXT--------------------

Document information

WebSphere Application Server Community Edition

Tomcat

Software version:
1.1.0.1, 1.1.0.2, 2.1.0.1, 2.1.1.1, 2.1.1.2, 2.1.1.3, 2.1.1.4, 2.1.1.5, 3.0.0.0

Operating system(s):
AIX, Linux, Solaris, Windows

Software edition:
Elite, Enhanced, Entry

Reference #:
1577274

Modified date:
2012-01-09

Denial of service vulnerability in the web container of WebSphere Application
Server Community Edition

Flash (Alert)

Abstract

Denial of service vulnerability in the web container of WebSphere Application
Server Community Edition.

Content

A denial of service vulnerability was discovered in the Apache Tomcat web
container embedded in WebSphere Application Server Community Edition. A
specially crafted request with many parameters sent to a web endpoint can cause
the denial of service.

Follow the instructions below to apply a fix for your version of WebSphere
Application Server Community Edition:

	1. For the users of WebSphere Application Server Community Edition
	v3.0.0.0, apply the fix by following the "A Tomcat fix for WAS
	Community Edition v3.0.0.0" article.
	
	2. For the users of WebSphere Application Server Community Edition
	v2.1.x.x, upgrade WebSphere Application Server Community Edition to
	version 2.1.1.6. Please refer to the download URL in the Related
	Information section.
	
	3. For the users of WebSphere Application Server Community Edition
	v1.1.x.x with extended support contract, please contact IBM Support to
	require the patch.

Related information

WAS Community Edition v2.1.1.6 Download URL:
https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source=wsced_archive&lang=en_US&S_PKG=2116&cp=UTF-8

A tomcat fix for WAS Community Edition v3.0.0.0:
http://www-01.ibm.com/support/docview.wss?uid=swg21575700

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=+GuA
-----END PGP SIGNATURE-----