Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2008.0281 -- [Win][Linux][HP-UX][Solaris][AIX] IBM Rational ClearQuest Web Username Enumeration Exposure and User Information Disclosure 18 March 2008 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM Rational ClearQuest version 7.0.1.1 IBM Rational ClearQuest version 7.0.0.2 Publisher: IBM Operating System: Windows Linux variants AIX HP-UX Solaris Impact: Access Confidential Data Reduced Security Access: Remote/Unauthenticated CVE Names: CVE-2008-1287 CVE-2008-1288 Original Bulletin: http://www-1.ibm.com/support/docview.wss?uid=swg1PK55753 http://www-1.ibm.com/support/docview.wss?uid=swg1PK55561 Comment: This ESB contains two (2) separate IBM advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- PK55561: Security vulnerability from unsuccessful login attempts (3.2.1) Fixes are available IBM Rational ClearQuest iFix (7.0.1.1_IFIX01) for version 7.0.1.1 IBM Rational ClearQuest iFix (7.0.0.2_IFIX01) for version 7.0.0.2 APAR status Closed as program error. Error description IBM Rational ClearQuest Web: The error messages produced by unsuccessful login attempts make it possible to perform scripted username enumeration through the login pages within the application. Local fix Problem summary In ClearQuest web it is possible to perform scripted username enumeration exposing a security vulnerability from unsuccessful login attempts. Problem conclusion Fixed in ClearQuest web 7.0.1.1-ifix01 and 7.0.0.2-ifix01. Temporary fix Comments APAR information APAR number PK55561 Reported component name CLEARQUEST WIN Reported component ID 5724G3600 Reported release 700 Status CLOSED PER PE NoPE HIPER NoHIPER Special Attention NoSpecatt Submitted date 2007-10-26 Closed date 2008-03-04 Last modified date 2008-03-04 APAR is sysrouted FROM one or more of the following: APAR is sysrouted TO one or more of the following: Modules/Macros Publications Referenced Fix information Fixed component name CLEARQUEST WIN Fixed component ID 5724G3600 Applicable component levels R700 PSN UP - ----------------------------------------------------------------- PK55753: User identifier contained within cookie (Security vulnerability 3.2.2) APAR status Closed as program error. Error description The ClearQuest application uses session cookies that contain information about the user. Local fix Problem summary In ClearQuest Web, session cookies remained that contain information about the user. Problem conclusion Fixed in ClearQuest 7.0.1.1-ifix01 and 7.0.0.2-ifix01. Temporary fix Comments APAR information APAR number PK55753 Reported component name CLEARQUEST WIN Reported component ID 5724G3600 Reported release 700 Status CLOSED PER PE NoPE HIPER NoHIPER Special Attention NoSpecatt Submitted date 2007-10-31 Closed date 2008-03-04 Last modified date 2008-03-04 APAR is sysrouted FROM one or more of the following: APAR is sysrouted TO one or more of the following: Modules/Macros Publications Referenced Fix information Fixed component name CLEARQUEST WIN Fixed component ID 5724G3600 Applicable component levels R700 PSN UP - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBR98Kbyh9+71yA2DNAQJLFAP+JskyRTrU4BEiifbWbZ+ZWwwSsHO+WNer D37Hd4/4UUI1bMwnz/+335vT3bGFoPLJ3wLkg7GxscnzFVOzO435N1mgciEjuez7 Grf1ztfkuHx1HRfeaIFw/omwh587znP8ePsI/cLgnVocAYN6P4T2Yzl/DsjGz9+a 3GicWBt1dVY= =JYky -----END PGP SIGNATURE-----