Lucene search

K
ibmIBMD64F0835BDCB6BD9E62FC3420E4ADEBF9C94392639EDD9904D918250DEEFD582
HistorySep 25, 2022 - 9:06 p.m.

Security Bulletin: InfoSphere Guardium Data Redaction affected by SSL vulnerability in Apache Axis2 (CVE-2012-5785)

2022-09-2521:06:56
www.ibm.com
11

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

Abstract

An SSL vulnerability exists in Apache Axis which is used by InfoSphere Guardium Data Redaction to process HTTPS requests from the Redaction SOAP API .

Content

VULNERABILITY DETAILS:

CVE ID:CVE-2012-5785

DESCRIPTION:
Apache Axis2/Java, as used in multiple products, could allow a remote attacker to conduct spoofing attacks, caused by the failure to verify that the server hostname matches a domain name in the subjectโ€™s Common Name (CN) field of the X.509 certificate. An attacker could exploit this vulnerability using man-in-the-middle techniques to spoof an SSL server and launch further attacks against a vulnerable target.

CVSS:
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/79830 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

AFFECTED PRODUCTS:
InfoSphere Guardium Data Redaction v.2.1, 2.5

REMEDIATION:

Vendor Fix(es):
Please update to the latest release 2.5.1 which is available on IBM Passport Advantage.

Workaround(s):
Delete file %IBM_REDACTION_HOME%\server\lib\axis2-1.4.6083.jar to disable the Redaction SOAP API .

Mitigation(s):
None.

REFERENCES:
ยท Complete CVSS v2 Guide
ยท On-line Calculator V2

RELATED INFORMATION:

ยท IBM Secure Engineering Web Portal
ยท IBM Product Security Incident Response Blog** **

ACKNOWLEDGEMENT:

None.

CHANGE HISTORY:

25-September-2013: Original version published
10-September-2015: Replaced CVSS Guide link

_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _

_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an โ€œindustry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.โ€ IBM PROVIDES THE CVSS SCORES โ€œAS ISโ€ WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{โ€œProductโ€:{โ€œcodeโ€:โ€œSS6NQ7โ€,โ€œlabelโ€:โ€œInfoSphere Guardium Data Redactionโ€},โ€œBusiness Unitโ€:{โ€œcodeโ€:โ€œBU053โ€,โ€œlabelโ€:โ€œCloud \u0026 Data Platformโ€},โ€œComponentโ€:โ€œโ€“โ€,โ€œPlatformโ€:[{โ€œcodeโ€:โ€œPF025โ€,โ€œlabelโ€:โ€œPlatform Independentโ€}],โ€œVersionโ€:โ€œVersion Independentโ€,โ€œEditionโ€:โ€œโ€,โ€œLine of Businessโ€:{โ€œcodeโ€:โ€œLOB10โ€,โ€œlabelโ€:โ€œData and AIโ€}}]

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

Related for D64F0835BDCB6BD9E62FC3420E4ADEBF9C94392639EDD9904D918250DEEFD582