Lucene search

K
ibmIBM164CA84E2262C33778EE3D5D846BC203EA558123C27A04DD886E14B3FBD81D0D
HistorySep 25, 2022 - 10:31 p.m.

Security Bulletin: Security Vulnerabilities fixed in IBM WebSphere Application Server 6.1.0.43

2022-09-2522:31:03
www.ibm.com
18

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.011 Low

EPSS

Percentile

84.6%

Abstract

Cross reference list for security vulnerabilities fixed in WebSphere Application Server Fix Pack 6.1.0.43

Content

VULNERABILITY DETAILS:
CVE ID:****CVE-2011-1376 (PM49712)

DESCRIPTION: IBM Websphere Application Server, when running on IBM i operating systems, applies insecure permissions to files in the $WAS_HOME/systemapps/isclite.ear and $WAS_HOME/bin/client_ffdc directories via the iscdeploy script following fix pack installation. A local attacker could exploit this vulnerability to read or write to affected files.**** CVSS:

CVSS Base Score: 4.4
CVSS Temporal Score: See
<https://exchange.xforce.ibmcloud.com/vulnerabilities/71230&gt;__ for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:L/AC:M/Au:N/C:P/I:P/A:P)

**AFFECTED PLATFORMS:**The following IBM WebSphere Application Server for IBM i operating systems, Versions are affected:
· Version 8
· Version 7
· Version 6.1

**REMEDIATION:**The recommended solution is to apply the Fix Pack for each named product as soon as practical

Fix:

Refer to FLASH <http://www.ibm.com/support/docview.wss?uid=swg21569205&gt; for more information or Apply a PTF containing this APAR PM49712, as noted below:

For IBM WebSphere Application Server :

For V8.0 through 8.0.0.1:
o Install PTF that contains Fix Pack 2 (8.0.0.2), or later.

For V7.0 through 7.0.0.19:
o Install PTF that contains Fix Pack 21 (7.0.0.21), or later

For V6.1.0 through 6.1.0.41:
o Install PTF that contains Fix Pack 43 (6.1.0.43), or later.

· Workaround(s): None

· Mitigation(s): None

CVE ID:****_CVE-2011-4889 (PM52049) _

DESCRIPTION: The IBM WebSphere Application Server Virtual Member Manager could provide weaker than expected security, caused by an error in the javax.naming.directory.AttributeInUseException class when updating passwords on a configuration using IBM Tivoli Directory Server. A remote attacker could exploit this vulnerability to log into an application using an old password that has been changed.

CVSS:

_CVSS Base Score: 5
CVSS Temporal Score: See _<https://exchange.xforce.ibmcloud.com/vulnerabilities/72581&gt;__ for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:N/AC:L/Au:N/C:N/I:P/A:N)

**AFFECTED PLATFORMS:**The following IBM WebSphere Application Server for distributed operating systems, IBM i operating systems, and z/OS operating system Versions are affected:
· Version 8
· Version 7
· Version 6.1

**REMEDIATION:**The recommended solution is to apply the Fix Pack for each named product as soon as practical

Fix:

Apply a Fix Pack or PTF containing this APAR PM52049, as noted below:

For IBM WebSphere Application Server :

For V8.0 through 8.0.0.1:
o Install Fix Pack 2 (8.0.0.2), or later.

For V7.0 through 7.0.0.19:
o Install Fix Pack 21 (7.0.0.21), or later

For V6.1.0 through 6.1.0.41:
o Install Fix Pack 43 (6.1.0.43), or later.

· Workaround(s): None

· Mitigation(s): none.

CVE ID:_ _CVE-2012-0720 (PM52274)

DESCRIPTION: WebSphere Application Server Administration Console is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the Administrative Console. A remote attacker could exploit this vulnerability using unspecified attack vectors to inject script in a victim’s Web browser within the security context of the hosting Web site.

CVSS:

CVSS Base Score: 4.3
CVSS Temporal Score: See
<https://exchange.xforce.ibmcloud.com/vulnerabilities/74044&gt;_ for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:N)_

**AFFECTED PLATFORMS:**The following IBM WebSphere Application Server for distributed operating systems, IBM i operating systems, and z/OS operating system Versions are affected:
· Version 8
· Version 7
· Version 6.1

**REMEDIATION:**The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical

Fix:

Apply a Fix Pack or PTF containing this APAR PM52274, as noted below:

For IBM WebSphere Application Server

For V8.0 through 8.0.0.2:
o Install Fix Pack 3 (8.0.0.3), or later.

For V7.0 through 7.0.0.21:
o Install Fix Pack 23 (7.0.0.23), or later.

For V6.1.0 through 6.1.0.41:
o Install Fix Pack 43 (6.1.0.43), or later.

· Workaround(s): None

· Mitigation(s): When you have the Administrator Console open, do not use your web browser to visit other websites. Open another web browser to visit other websites.

CVE ID:_ __CVE-2012-0717 (PM52351) _

DESCRIPTION:
WebSphere Application Server could allow a remote attacker to bypass SSL client certificate authentication in IBM HTTP Server when ALL of the following conditions are true in the same SSL enabled virtual host:
· SSL is enabled with “SSLEnable” (not enabled by default)
· SSL Client Authentication is enabled with “SSLClientAuth required_reset” (not enabled by default, “SSLClientAuth required” not affected
· SSLv2 has not been disabled with “SSLProtocolDisable SSLv2
· “SSLClientAuthRequire” is not configured

CVSS:

CVSS Base Score: 2.6
CVSS Temporal Score: See
<https://exchange.xforce.ibmcloud.com/vulnerabilities/73749&gt;_ for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:N/AC:H/Au:N/C:N/I:P/A:N)_

**AFFECTED PLATFORMS:**The following IBM WebSphere Application Server for distributed operating systems, IBM i operating systems, and z/OS operating system Versions are affected:
· Version 7
· Version 6.1

**REMEDIATION:**The recommended solution is to apply the Fix Pack for each named product as soon as practical

Fix:

Apply a Fix Pack or PTF containing this APAR PM52351, as noted below:

For IBM WebSphere Application Server :

For V7.0 through 7.0.0.21:
o Install Fix Pack 23 (7.0.0.23), or later.

For V6.1.0 through 6.1.0.41:
o Install Fix Pack 43 (6.1.0.43), or later.

· Workaround(s): None

· Mitigation(s): Disable SSLv2 is the preferred method, but any other option in the description list above can be changed instead.

CVE ID:** **_CVE-2012-0716 (PM53132) _

DESCRIPTION: WebSphere Application Server Administration Console is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the Administrative Console. A remote authenticated attacker could exploit this vulnerability using unspecified attack vectors to inject script in a victim’s Web browser within the security context of the hosting Web site.

CVSS:

CVSS Base Score: 4.3
CVSS Temporal Score: See
<https://exchange.xforce.ibmcloud.com/vulnerabilities/73748&gt;_ for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:N)_

**AFFECTED PLATFORMS:**The following IBM WebSphere Application Server for distributed operating systems, IBM i operating systems, and z/OS operating system Versions are affected:
· Version 8
· Version 7
· Version 6.1

**REMEDIATION:**The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical

Fix:

Apply a Fix Pack or PTF containing this APAR PM53132, as noted below:

For IBM WebSphere Application Server :

For V8.0 through 8.0.0.2:
o Install Fix Pack 3 (8.0.0.3), or later.

For V7.0 through 7.0.0.21:
o Install Fix Pack 23 (7.0.0.23), or later.

For V6.1.0 through 6.1.0.41:
o Install Fix Pack 43 (6.1.0.43), or later.

· Workaround(s): None

· Mitigation(s): When you have the Administrator Console open, do not use the web browser to visit other websites. Open another web browser to visit other websites.

CVE ID:****_CVE-2012-0193 (PM53930) _

DESCRIPTION: WebSphere Application Server is vulnerable to a denial of service, caused by insufficient randomization of Java hash data structures. By sending multiple specially-crafted HTTP POST requests to an affected application containing conflicting hash key values, a remote attacker could exploit this vulnerability to cause the consumption of CPU resources.

CVSS:

_CVSS Base Score: 5
CVSS Temporal Score: See _https://exchange.xforce.ibmcloud.com/vulnerabilities/72298 _ _for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

**AFFECTED PLATFORMS:**The following IBM WebSphere Application Server for distributed operating systems, IBM i operating systems, and z/OS operating system Versions are affected:
· Version 8
· Version 7
· Version 6.1

**REMEDIATION:**The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical

Fix:

Refer to FLASH <http://www.ibm.com/support/docview.wss?uid=swg21577532&gt; for more information or
Apply a Fix Pack or PTF containing this APAR PM53930, as noted below:

For IBM WebSphere Application Server :

For V8.0 through 8.0.0.2:
o Install Fix Pack 3 (8.0.0.3), or later.

For V7.0 through 7.0.0.21:
o Install Fix Pack 23 (7.0.0.23), or later.

For V6.1.0 through 6.1.0.41:
o Install Fix Pack 43 (6.1.0.43), or later.

· Workaround(s): None

· Mitigation(s): none

REFERENCES:
· Complete CVSS Guide_ _
· On-line Calculator V2

CHANGE HISTORY:
· 19 March 2012: Original copy published
· 21 March 2012: Link to xforce database added

_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _

_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{“Product”:{“code”:“SSEQTP”,“label”:“WebSphere Application Server”},“Business Unit”:{“code”:“BU059”,“label”:“IBM Software w/o TPS”},“Component”:“General”,“Platform”:[{“code”:“PF002”,“label”:“AIX”},{“code”:“PF010”,“label”:“HP-UX”},{“code”:“PF012”,“label”:“IBM i”},{“code”:“PF016”,“label”:“Linux”},{“code”:“PF027”,“label”:“Solaris”},{“code”:“PF033”,“label”:“Windows”},{“code”:“PF035”,“label”:“z/OS”}],“Version”:“8.0;7.0;6.1”,“Edition”:“Base;Developer;Express;Network Deployment”,“Line of Business”:{“code”:“LOB45”,“label”:“Automation”}},{“Product”:{“code”:“SS7K4U”,“label”:“WebSphere Application Server for z/OS”},“Business Unit”:{“code”:“BU059”,“label”:“IBM Software w/o TPS”},“Component”:“General”,“Platform”:[{“code”:“PF035”,“label”:“z/OS”},{“code”:“”,“label”:“OS/390”}],“Version”:“8.0;7.0;6.1”,“Edition”:“”,“Line of Business”:{“code”:“LOB45”,“label”:“Automation”}},{“Product”:{“code”:“SSEQTJ”,“label”:“IBM HTTP Server”},“Business Unit”:{“code”:“BU059”,“label”:“IBM Software w/o TPS”},“Component”:“SSL”,“Platform”:[{“code”:“PF002”,“label”:“AIX”},{“code”:“PF010”,“label”:“HP-UX”},{“code”:“PF012”,“label”:“IBM i”},{“code”:“PF016”,“label”:“Linux”},{“code”:“PF027”,“label”:“Solaris”},{“code”:“PF033”,“label”:“Windows”},{“code”:“PF035”,“label”:“z/OS”}],“Version”:“8.0;7.0;6.1”,“Edition”:“All Editions”,“Line of Business”:{“code”:“LOB45”,“label”:“Automation”}}]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.011 Low

EPSS

Percentile

84.6%

Related for 164CA84E2262C33778EE3D5D846BC203EA558123C27A04DD886E14B3FBD81D0D