-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2012.1044.2
Security Vulnerabilities fixed in IBM WebSphere Application Server 8.5.0.1
                             15 November 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM WebSphere Application Server
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   Linux variants
                   Solaris
                   Windows
Impact/Access:     Administrator Compromise  -- Existing Account            
                   Increased Privileges      -- Remote with User Interaction
                   Modify Arbitrary Files    -- Remote with User Interaction
                   Overwrite Arbitrary Files -- Remote with User Interaction
                   Denial of Service         -- Remote/Unauthenticated      
                   Cross-site Scripting      -- Remote with User Interaction
                   Access Confidential Data  -- Remote with User Interaction
                   Reduced Security          -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2012-4853 CVE-2012-4851 CVE-2012-4850
                   CVE-2012-3330 CVE-2012-3325 CVE-2012-3311
                   CVE-2012-3306 CVE-2012-3305 CVE-2012-3304
                   CVE-2012-3293 CVE-2012-2191 CVE-2012-2190
                   CVE-2012-2159  

Reference:         ESB-2012.1040
                   ESB-2012.1014
                   ESB-2012.0976
                   ESB-2012.0944
                   ESB-2012.0937
                   ESB-2012.0936
                   ESB-2012.0933
                   ESB-2012.0930
                   ESB-2012.0916
                   ESB-2012.0915
                   ESB-2012.0822
                   ESB-2012.0801
                   ESB-2012.0726
                   ESB-2012.0693
                   ESB-2012.0530

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21614265

Revision History:  November 15 2012: Updated CVE number for PM67082 and added PM68643
                   October  31 2012: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Vulnerabilities fixed in IBM WebSphere Application Server 8.5.0.1

Flash (Alert)

Document information

WebSphere Application Server

General

Software version: 8.5

Operating system(s): AIX, HP-UX, IBM i, Linux, Solaris, Windows, i5/OS, z/OS

Software edition: Base, Developer, Express, Network Deployment

Reference #: 1614265

Modified date: 2012-10-30

Abstract

Cross reference list for security vulnerabilities fixed in IBM WebSphere 
Application Server Fix Pack 8.5.0.1 Content

VULNERABILITY DETAILS:

CVE ID: CVE-2012-3304 (PM54356)

DESCRIPTION: WebSphere Application Server could allow a remote attacker to 
hijack a valid users session, caused by an error in the Administrative 
Console. An attacker could exploit this vulnerability to gain privileges of 
the victim.

CVSS:

CVSS Base Score: 6.8 CVSS Temporal Score: See 
http://xforce.iss.net/xforce/xfdb/77476 for the current score CVSS 
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:P/I:P/A:P)

AFFECTED PLATFORMS: The following IBM WebSphere Application Server for 
distributed operating systems, IBM i operating systems, and z/OS operating 
system Versions are affected: Version 8.5 Version 8 Version 7 Version 6.1

REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical

Fix:

Apply a Fix Pack or PTF containing this APAR PM54356, as noted below:

For IBM WebSphere Application Server :

For V8.5: o Install Fix Pack 1 (8.5.0.1), or later.

For V8.0 through 8.0.0.4: o Install Fix Pack 5 (8.0.0.5), or later (targeted 
to be available 12 November 2012).

For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later.

For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later.

Workaround(s): None

Mitigation(s): none

CVE ID: CVE-2012-3293 (PM60839)

DESCRIPTION: WebSphere Application Server Administrative Console could allow a
cross-frame scripting attack, caused by improper validation of input in the 
Administrative Console. A remote attacker could exploit this vulnerability to
monitor and capture user activity.

CVSS:

CVSS Base Score: 4.3 CVSS Temporal Score: 
Seehttp://xforce.iss.net/xforce/xfdb/77179 for the current score CVSS 
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

AFFECTED PLATFORMS: The following IBM WebSphere Application Server for 
distributed operating systems, IBM i operating systems, and z/OS operating 
system Versions are affected: Version 8.5 Version 8 Version 7 Version 6.1

REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical

Fix: Apply a Fix Pack or PTF containing this APAR PM60839, as noted below:

For IBM WebSphere Application Server

For V8.5 : o Install Fix Pack 1 (8.5.0.1), or later.

For V8.0 through 8.0.0.3: o Install Fix Pack 4 (8.0.0.4), or later.

For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later.

For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later.

Workaround(s): None

Mitigation(s): When you have the Administrator Console open, do not use your 
web browser to visit other websites. Open another web browser to visit other 
websites.

CVE ID: CVE-2012-3311 (PM61388)

DESCRIPTION: WebSphere Application Server, when running on z/OS could allow a
local attacker to bypass security restrictions, caused by a failure to perform
CBIND checks when using Federated Repositories for IIOP connections using 
Optimized Local Adapters. An attacker could exploit this vulnerability via a 
client application to access or modify application data.

CVSS:

CVSS Base Score: 3 CVSS Temporal Score: 
Seehttp://xforce.iss.net/xforce/xfdb/77697 for the current score CVSS 
Environmental Score*: Undefined CVSS String: (AV:L/AC:M/Au:S/C:P/I:P/A:N)

AFFECTED PLATFORMS: The following IBM WebSphere Application Server for z/OS 
operating system Versions are affected: Version 8.5 Version 8 Version 7

REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical

Fix: Apply a Fix Pack or PTF containing this APAR PM61388, as noted below:

For IBM WebSphere Application Server

For V8.5 : o Install Fix Pack 1 (8.5.0.1), or later.

For V8.0 through 8.0.0.4: o Install Fix Pack 4 (8.0.0.5), or later (targeted 
to be available 12 November 2012).

For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later.

For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later.

Workaround(s): None

Mitigation(s): None

CVE ID: CVE-2012-3305 (PM62467)

DESCRIPTION: WebSphere Application Server could allow a remote attacker to 
traverse directories on the system. An attacker could exploit this 
vulnerability by deploying a specially-crafted application file to overwrite 
files outside of the application deployment directory.

CVSS:

CVSS Base Score: 5.8 CVSS Temporal Score: 
Seehttp://xforce.iss.net/xforce/xfdb/77477 for the current score CVSS 
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:P)

AFFECTED PLATFORMS: The following IBM WebSphere Application Server for 
distributed operating systems, IBM i operating systems, and z/OS operating 
system Versions are affected: Version 8.5 Version 8 Version 7 Version 6.1

REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical

Fix: Apply a Fix Pack or PTF containing this APAR PM62467, as noted below:

For IBM WebSphere Application Server

For V8.5 : o Install Fix Pack 1 (8.5.0.1), or later.

For V8.0 through 8.0.0.4: o Install Fix Pack 5 (8.0.0.5), or later (targeted 
to be available 12 November 2012).

For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later.

For V6.1.0 through 6.1.0.45: o Install Fix Pack 47 (6.1.0.47), or later (check
back for target date)

Workaround(s): None

Mitigation(s): none

CVE ID: CVE-2012-4853 (PM62920)

DESCRIPTION: WebSphere Application Server is vulnerable to cross-site request
forgery, caused by improper validation of user-supplied input. By persuading 
an authenticated user to visit a malicious Web site, a remote attacker could 
exploit this vulnerability to obtain sensitive information.

CVSS:

CVSS Base Score: 4.3 CVSS Temporal Score: 
Seehttp://xforce.iss.net/xforce/xfdb/79598 for the current score CVSS 
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

AFFECTED PLATFORMS: The following IBM WebSphere Application Server for 
distributed operating systems, IBM i operating systems, and z/OS operating 
system Versions are affected: Version 8.5 Version 8 Version 7 Version 6.1

REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical

Fix: Apply a Fix Pack or PTF containing this APAR PM62920, as noted below:

For IBM WebSphere Application Server

For V8.5 : o Install Fix Pack 1 (8.5.0.1), or later.

For V8.0 through 8.0.0.5: o Install Fix Pack 6 (8.0.0.6), or later (targeted 
to be available 29 April 2013).

For V7.0 through 7.0.0.25: o Install Fix Pack 27 (7.0.0.25), or later 
(targeted to be available 21 January 2013).

For V6.1.0 through 6.1.0.45: o Install Fix Pack 47 (6.1.0.47), or later (check
back for target date)

Workaround(s): None

Mitigation(s): none

CVE ID: CVE-2012-2190 and CVE-2012-2191 (PM66218)

DESCRIPTION: IBM HTTP Server may be vulnerable to a denial of service. By 
sending a specially-crafted Secure Sockets Layer (SSL) packets to the 
vulnerable Web server, a remote attacker could cause a segmentation fault.

CVE-2012-2190 CVSS:

CVSS Base Score: 5.0 CVSS Temporal Score: 
Seehttp://xforce.iss.net/xforce/xfdb/75994 for the current score CVSS 
Environmental Score*: Undefined CVSS String: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-2012-2191 CVSS:

CVSS Base Score: 5.0 CVSS Temporal Score: 
Seehttp://xforce.iss.net/xforce/xfdb/75996 for the current score CVSS 
Environmental Score*: Undefined CVSS String: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

AFFECTED PLATFORMS: The following IBM WebSphere Application Server for 
distributed operating systems, IBM i operating systems, and z/OS operating 
system Versions are affected: Version 8.5 Version 8 Version 7 Version 6.1

REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical

Fix: Apply a Fix Pack or PTF containing this APAR PM66218, as noted below:

For IBM WebSphere Application Server :

For V8.5 : o Install Fix Pack 1 (8.5.0.1), or later.

For V8.0 through 8.0.0.3: o Install Fix Pack 4 (8.0.0.4), or later.

For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later.

For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later.

Workaround(s): None

Mitigation(s): None

CVE ID: CVE-2012-2159 (PM62795 or PM66410)

DESCRIPTION: WebSphere Application Server could allow a cross-site scripting 
attack, caused by improper validation of input by the help system in the 
Administrative Console. A remote attacker could exploit this vulnerability 
using a specially-crafted URL to inject script in a victim's Web browser 
within the security context of the hosting Web site.

CVSS:

CVSS Base Score: 4.3 CVSS Temporal Score: 
Seehttp://xforce.iss.net/xforce/xfdb/74832 for the current score CVSS 
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

AFFECTED PLATFORMS: The following IBM WebSphere Application Server for 
distributed operating systems, IBM i operating systems, and z/OS operating 
system Versions are affected: Version 8.5 Version 8

REMEDIATION: The recommended solution is to apply the Fix Pack for each named
product as soon as practical

Fix: Apply a Fix Pack or PTF containing this APAR PM62795 or PM66410, as noted
below:

For IBM WebSphere Application Server :

For V8.5 (PM66410) : o Install Fix Pack 1 (8.5.0.1), or later.

For V8.0 through 8.0.0.3 (PM62795): o Install Fix Pack 4 (8.0.0.4), or later.

Workaround(s): None

Mitigation(s): Remove iehs.war from isclite.ear

CVE ID: CVE-2012-3306 (PM66514)

DESCRIPTION: WebSphere Application Server could provide weaker than expected 
security caused by a failure to purge passwords from the authentication cache
when multi domain support is enabled.

CVSS:

CVSS Base Score: 4.3 CVSS Temporal Score: See 
http://xforce.iss.net/xforce/xfdb/77478 for the current score CVSS 
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

AFFECTED PLATFORMS: The following IBM WebSphere Application Server for 
distributed operating systems, IBM i operating systems, and z/OS operating 
system Versions are affected: Version 8.5 Version 8 Version 7

REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical

Fix:

Apply a Fix Pack or PTF containing this APAR PM66514, as noted below:

For IBM WebSphere Application Server :

For V8.5: o Install Fix Pack 1 (8.5.0.1), or later.

For V8.0 through 8.0.0.4: o Install Fix Pack 5 (8.0.0.5), or later (targeted 
to be available 12 November 2012).

For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later.

For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later.

Workaround(s): None

Mitigation(s): none

CVE ID: CVE-2012-4850 (PM67082)

DESCRIPTION: WebSphere Application Server V8.5 Liberty Profile when using 
JAX-RS could allow a remote attacker to gain eleveated privileges on the 
server caused by incorrect request validation.

CVSS:

CVSS Base Score: 7.5 CVSS Temporal Score: See 
http://xforce.iss.net/xforce/xfdb/79539 for the current score CVSS 
Environmental Score*: Undefined CVSS String: (AV:N/AC:L/Au:N/C:P/I:P/A:P )

AFFECTED PLATFORMS: The following IBM WebSphere Application Server for 
distributed operating systems, IBM i operating systems, and z/OS operating 
system Versions are affected: Version 8.5 Liberty Profile only

REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical

Fix:

Apply a Fix Pack or PTF containing this APAR PM67082, as noted below:

For IBM WebSphere Application Server :

For V8.5: o Install Fix Pack 1 (8.5.0.1), or later.

Workaround(s): None

Mitigation(s): none

CVE ID: CVE-2012-4851 (PM68643)

DESCRIPTION: WebSphere Application Server V8.5 Liberty Profile could allow a 
cross-site scripting attack, caused by improper validation of the URI. A 
remote attacker could exploit this vulnerability using a specially-crafted URL
to inject script in a victim's Web browser withing the security context of the
hosting Web site. CVSS:

CVSS Base Score: 4.3 CVSS Temporal Score: See 
http://xforce.iss.net/xforce/xfdb/79541 for the current score CVSS 
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:N )

AFFECTED PLATFORMS: The following IBM WebSphere Application Server for 
distributed operating systems, IBM i operating systems, and z/OS operating 
system Versions are affected: Version 8.5 Liberty Profile only

REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for
each named product as soon as practical Fix:

Apply a Fix Pack or PTF containing this APAR PM68643, as noted below:

For IBM WebSphere Application Server :

For V8.5: o Install Fix Pack 1 (8.5.0.1), or later.

Workaround(s): None

Mitigation(s): none

CVE ID: CVE-2012-3325 (PM71296)

DESCRIPTION: If you have installed an Interim Fix for PM44303, or a fix pack 
containing PM44303, you have the potential for an authenticated attacker to 
bypass security restrictions, caused by an error when validating user 
credentials. This could allow a user to gain unauthorized administrative 
access to an application and potentially gain access to confidential and 
critical customer data.

For more information please refer to Flash:

http://www-01.ibm.com/support/docview.wss?uid=swg21609067

CVSS:

CVSS Base Score: 6.0 CVSS Temporal Score: See 
http://xforce.iss.net/xforce/xfdb/77959 for the current score CVSS 
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:S/C:P/I:P/A:P)

AFFECTED PLATFORMS: The following IBM WebSphere Application Server for 
distributed operating systems, IBM i operating systems, and z/OS operating 
system Versions are affected: Version 8.5 Version 8 Version 7 Version 6.1

REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical

Fix:

Apply a Fix Pack or PTF containing this APAR PM71296, as noted below:

For IBM WebSphere Application Server :

For V8.5: o Install Fix Pack 1 (8.5.0.1), or later.

For V8.0 through 8.0.0.4: o Install Fix Pack 5 (8.0.0.5), or later (targeted 
to be available 12 November 2012).

For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later.

For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later.

Workaround(s): None

Mitigation(s): none

CVE ID: CVE-2012-3330 (PM71319)

DESCRIPTION: WebSphere Application Server and WebSphere Virtual Enterprise are
vulnerable to a denial of service, caused by an error in the proxy server 
component. By sending a specially-crafted request, a remote attacker could 
exploit this vulnerability to cause the proxy to be marked as down and deny 
access to applications.

CVSS:

CVSS Base Score: 5.0 CVSS Temporal Score: See 
http://xforce.iss.net/xforce/xfdb/78047 for the current score CVSS 
Environmental Score*: Undefined CVSS String: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

AFFECTED PLATFORMS: The following IBM WebSphere Application Server for 
distributed operating systems, IBM i operating systems, and z/OS operating 
system Versions are affected: Version 8.5 Version 8 Version 7

REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical

Fix:

Apply a Fix Pack or PTF containing this APAR PM71319, as noted below:

For IBM WebSphere Application Server :

For V8.5: o Install Fix Pack 1 (8.5.0.1), or later.

For V8.0 through 8.0.0.4: o Install Fix Pack 5 (8.0.0.5), or later (targeted 
to be available 12 November 2012).

For V7.0 through 7.0.0.25: o Install Fix Pack 27 (7.0.0.27), or later 
(targeted to be available 21 January 2013).

Workaround(s): None

Mitigation(s): none

REFERENCES: Complete CVSS Guide http://www.first.org/cvss/cvss-guide.html 
On-line Calculator V2 http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2

CHANGE HISTORY: 29 October 2012: Original copy published

*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the 
Reference section of this Flash.

Note: According to the Forum of Incident Response and Security Teams (FIRST),
the Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Cross reference information Segment Product Component Platform Version Edition
Application Servers IBM HTTP Server Application Servers WebSphere Virtual 
Enterprise

Copyright and trademark information

IBM, the IBM logo and ibm.com are trademarks of International Business 
Machines Corp., registered in many jurisdictions worldwide. Other product and
service names might be trademarks of IBM or other companies. A current list of
IBM trademarks is available on the Web at "Copyright and trademark 
information" at www.ibm.com/legal/copytrade.shtml.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=qRFY
-----END PGP SIGNATURE-----