copyright
|
disclaimer
|
privacy
|
contact
HOME
About
AusCERT
Membership
Contact Us
PKI Services
Training
Publications
Sec. Bulletins
Conferences
News & Media
Services
Web Log
Site Map
Site Help
Member login
Login »
Become a member »
Home
»
Security Bul...
»
Security Bul...
»
AusCERT Exte...
» ESB-2013.0590 - [Win][Linux][OSX] IBM Sametime: Mult...
ESB-2013.0590 - [Win][Linux][OSX] IBM Sametime: Multiple vulnerabilities
Date:
29 April 2013
Click here for printable version
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2013.0590 Security Bulletin: Vulnerability in Sametime Links (CVE-2013-0533), Sametime Connect Clients and in Sametime Advanced Server (CVE-2013-0553) 29 April 2013 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM Sametime Publisher: IBM Operating System: Linux variants OS X Windows Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Cross-site Scripting -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2013-0553 CVE-2013-0533 Original Bulletin: http://www-01.ibm.com/support/docview.wss?uid=swg21633620 http://www-01.ibm.com/support/docview.wss?uid=swg21633618 Comment: This bulletin contains two (2) IBM security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- Security Bulletin: Vulnerability in Sametime Links (CVE-2013-0533) Document information IBM Sametime STLinks/Toolkits Software version: 8.0.2, 8.5, 8.5.1, 8.5.1.1, 8.5.1.2, 8.5.2, 8.5.2.1 Operating system(s): Linux, Mac OS X, Windows Reference #: 1633620 Modified date: 2013-04-22 Abstract Sametime Links can be exploited to create a DOM-based XSS vulnerability. A fix is provided. Content CVE-ID: CVE-2013-0533 DESCRIPTION The Lotus iNotes webmail interface includes a Sametime chat communication part. This interface suffers from a reflected, DOM-based XSS. As it is available on the same interface as the webmail system, this would allow attackers to execute arbitrary commands on the webmail interface for logged-in users and, for example, gain access to their emails. The issue can be fixed by updating the Sametime Links server with the fix provided here. CVSS: CVSS Base Score: 3.5 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/82655 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:M/AU:S/C:N/I:P/A:N) *The CVSS Environment Score is customer-environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section (below) of this Flash document. AFFECTED PLATFORMS Sametime Links 8.0.2, 8.5, 8.5.1, 8.5.1.1, 8.5.1.2, 8.5.2, 8.5.2.1 server on any platform. REMEDIATION The recommended solution is to apply the fixes that are provided by IBM for the affected Sametime Links server. FIX Refer to the following technote for instructions on how to download the relevant fixes: " Fix available for potential security vulnerability in IBM Sametime Links server" WORKAROUND None known; apply fixes. MITIGATION None known; apply fixes. REFERENCES X-Force Vulnerability Database: http://xforce.iss.net/xforce/xfdb/82655 CVE-2013-0533: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0533 RELATED INFORMATION Complete CVSS Guide: http://www.first.org/cvss/cvss-guide.html On-line Calculator V2: http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2 ACKNOWLEDGEMENT The vulnerability was reported to IBM by Alexander Klink, n.runs. AG - --------------------------------------------------------------------------- Security Bulletin: Vulnerability in Sametime Connect Clients and in Sametime Advanced Server (CVE-2013-0553) Document information IBM Sametime Software version: 8.5.1, 8.5.1.1, 8.5.2, 8.5.2.1 Operating system(s): Linux, Mac OS X, Windows Reference #: 1633618 Modified date: 2013-04-22 Abstract Security vulnerability that has been identified in IBM Sametime clients. This vulnerability could allow a remote attacker to send commands in a specially crafted way in a Sametime Instant Message (IM). Content CVE-ID: CVE-2013-0553 DESCRIPTION: Security vulnerability that has been identified for IBM Sametime clients. This vulnerability could allow a remote attacker to send commands in a specially crafted way in a Sametime IM chat to a user or chat rooms to all the chat room participants. The issue exists in Sametime Connect, embedded Sametime in Notes, and in Sametime Advanced Server. CVSS: CVSS Base Score: 3.5 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/82915 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:M/AU:S/C:N/I:P/A:N) *The CVSS Environment Score is customer-environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the References section of this Flash. AFFECTED PLATFORMS: This potential vulnerability affects the Sametime clients, standalone and embedded starting at version 8.5.1, 8.5.1.1, 8.5.2, 8.5.2.1 on Windows, Macintosh and Linux. This vulnerability includes when these clients use a Sametime Gateway to Sametime Gateway connection. This potential vulnerability affects the following Sametime clients: - - Sametime Connect client (stand-alone) - - Embedded Sametime in the Lotus Notes client - - The above clients using Sametime Gateway connecting to another Sametime Gateway - - Sametime Advanced Connect client (stand-alone) - - Embedded Sametime Advanced in the Lotus Notes client - - Sametime Advanced Web client For specific versions affected, refer to the fix links below. The following client types are NOT affected by this issue: - - Sametime Web client (uses the Sametime Proxy server) - - Sametime Mobile clients - - STLinks integration - - Sametime version 8.0.2, 8.0.1, 8.0.0, or 7.5.1 of all rich clients (Notes embedded and stand-alone) - - Notes Basic clients - - Proxy 8.5 SDK clients - - The above clients using Sametime Gateway connecting to a third-party IM gateway DETERMINING WHICH EMBEDDED VERSION IS IN YOUR ENVIRONMENT: You can use the following technote to identify which embedded version is in use in your Notes environment: "What Sametime client versions are embedded in what Notes client versions?" (1370003) . REMEDIATION: The recommended solution is to apply the fixes that are provided by IBM for the affected Sametime clients. FIX: Refer to the following technotes for instructions on how to download the relevant fixes: Sametime Connect Clients: http://www.ibm.com/support/docview.wss?uid=swg21632785 Sametime Advanced Server: http://www.ibm.com/support/docview.wss?uid=swg21628657 WORKAROUND: None known; apply fixes. MITIGATION: None known; apply fixes REFERENCES: X-Force Vulnerability Database - http://xforce.iss.net/xforce/xfdb/82915 CVE-2013-0553 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0553 RELATED INFORMATION: Complete CVSS Guide - http://www.first.org/cvss/cvss-guide.html On-line Calculator V2 - http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2 ACKNOWLEDGEMENT: The vulnerability was reported to IBM by Brian Reilly from ADP. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUX3mcu4yVqjM2NGpAQLE8hAAix6p94R2Uj1uiehLZ31zq32QB/bKLBN9 PgJbDcWh2DXW3oKrURK9oRe3EgN3W9j+VS8zeTMuoAoW1WLIOftXh22a6BtpvK9x SAEThppXyO9IN5zF550YghD1jzHzPK8EejWgFut8tIOADSX9FW0AT/7W/ZPgMjXL hz7Hds/HSkZ9jOVAFR1/fZZ5Sh0vcM8SC8UiVfgf9F7/nMEjduJDk8dELXZUeG2v Iopp/kRMv50Eo+GLw37YjpifhjoaoCMusaDmN2dfscU9tFbAXlh8TLJvc8BtMd1r VClbOj9cn0N41jcenwr/uzM9MGunaxg4e3a4jSwf6oupwNkevt5pTdj6NKTBw72B Fz7G3QRhb73/wYLpW/dqkujpEZg9kmhltPnvFsYzca7aYBWW49UgENcaliGKX9Tf WZJ2Sv5EuXpRUpdpgc+JsCTJKs+PGg7MMNJdx2ane1XGjdCC0srqYkNrPe8p7xaL u70TauxvrAoahwp5URjsK9Pq+DI8DEWMA3YQJNV7G35BgzR4NvIGyCOJyt5qqHao vWxAecU16ognY3zKmcJvmn93MIaMbu6wiXRFHuLrC4wUgrPsSYzK3N7+QFt8twge DfQ1stebyPTtc/NPGB25coZr8RqmTtMejVHD9cNQm+ESQvxrPdKTbwZ94HK59yig SYyYBkDQsL0= =DTnK -----END PGP SIGNATURE-----
Comments? Click here
http://www.auscert.org.au/render.html?cid=1980&it=17440