![]() |
|
ESB-2012.0057 - [Win][Linux][Solaris][AIX] IBM WebSphere Application Server Community Edition: Denial of service - Remote with user interaction |
|
Date: 12 January 2012 Original URL: http://www.auscert.org.au/render.html?cid=1980&it=15333 Click here for PGP verifiable version -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2012.0057
Denial of service vulnerability in the web container of
WebSphere Application Server Community Edition
12 January 2012
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: IBM WebSphere Application Server Community Edition
Publisher: IBM
Operating System: AIX
Linux variants
Solaris
Windows
Impact/Access: Denial of Service -- Remote with User Interaction
Resolution: Patch/Upgrade
Original Bulletin:
http://www-01.ibm.com/support/docview.wss?uid=swg21577274
- --------------------------BEGIN INCLUDED TEXT--------------------
Document information
WebSphere Application Server Community Edition
Tomcat
Software version:
1.1.0.1, 1.1.0.2, 2.1.0.1, 2.1.1.1, 2.1.1.2, 2.1.1.3, 2.1.1.4, 2.1.1.5, 3.0.0.0
Operating system(s):
AIX, Linux, Solaris, Windows
Software edition:
Elite, Enhanced, Entry
Reference #:
1577274
Modified date:
2012-01-09
Denial of service vulnerability in the web container of WebSphere Application
Server Community Edition
Flash (Alert)
Abstract
Denial of service vulnerability in the web container of WebSphere Application
Server Community Edition.
Content
A denial of service vulnerability was discovered in the Apache Tomcat web
container embedded in WebSphere Application Server Community Edition. A
specially crafted request with many parameters sent to a web endpoint can cause
the denial of service.
Follow the instructions below to apply a fix for your version of WebSphere
Application Server Community Edition:
1. For the users of WebSphere Application Server Community Edition
v3.0.0.0, apply the fix by following the "A Tomcat fix for WAS
Community Edition v3.0.0.0" article.
2. For the users of WebSphere Application Server Community Edition
v2.1.x.x, upgrade WebSphere Application Server Community Edition to
version 2.1.1.6. Please refer to the download URL in the Related
Information section.
3. For the users of WebSphere Application Server Community Edition
v1.1.x.x with extended support contract, please contact IBM Support to
require the patch.
Related information
WAS Community Edition v2.1.1.6 Download URL:
https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source=wsced_archive&lang=en_US&S_PKG=2116&cp=UTF-8
A tomcat fix for WAS Community Edition v3.0.0.0:
http://www-01.ibm.com/support/docview.wss?uid=swg21575700
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=+GuA
-----END PGP SIGNATURE-----
|