CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
EPSS
Percentile
87.6%
IBM Sterling Secure Proxy is vulnerable to spoofing and information disclosure attacks.
VULNERABILITY DETAILS ** ** **CVE ID:******CVE-2013-0518
**DESCRIPTION:******Application Pages Do Not Break Out of 3rd Party HTML Frames.
IBM Sterling Secure Proxy Configuration Manager pages permit rendering within third party HTML frames. An internal attacker could potentially control elements of the framed pages and obtain unauthorized access to data.
** *CVSS:
CVSS Base Score: 3.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/83128 for the current score
CVSS Environmental Score: Undefined
CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N)
**CVE ID:******CVE-2013-0519
**DESCRIPTION:******Version Information Revealed In Page Title
The version of the web server is displayed in the HTTP header. This gives an attacker a head start in designing an attack specific to that web server version.
** *CVSS:
CVSS Base Score: 5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/82654 for the current score
CVSS Environmental Score: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)
**CVE ID:******CVE-2013-0520
**DESCRIPTION:******Inadequate Application Error Handling and Suppression.
Erroneous input data may result in an error condition and a java stack trace returned to the browser. An attacker can exploit this to obtain information about the application to design further attacks.
CVSS:
CVSS Base Score: 2.7
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/83433 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:A/AC:L/Au:S/C:P/I:N/A:N)
AFFECTED PRODUCTS:
Sterling Secure Proxy 3.4.1
Sterling Secure Proxy 3.4.0
Sterling Secure Proxy 3.3.01
Sterling Secure Proxy 3.2.0
REMEDIATION:
VENDOR FIXES:
IBM Sterling Secure Proxy 3.4.1: Apply Fix Pack 3.4.1.7 or later
IBM Sterling Secure Proxy 3.4.0: Apply 3.4.0.6 Interim Fix 1 or Fix Pack 3.4.1.7 or later
IBM Sterling Secure Proxy 3.3.01: Apply 3.3.01.23 Interim Fix 1 or Fix Pack 3.4.1.7 or later
IBM Sterling Secure Proxy 3.2.0: No fix available. Product goes off support 6/30/2013. Customers with releases prior to SSP 3.3.01 should apply 3.3.01.23 Interim Fix 1 or Fix Pack 3.4.1.7
WORKAROUND(S):
None. Apply Fixes.
MITIGATION(S):
None known.
ADDITIONAL INFORMATION:
The fixes listed above for IBM Sterling Secure Proxy also contains fixes for the following previously reported and fixed vulnerabilities.
Title | CVE ID | Link |
---|---|---|
Jetty hashtable denial of service | CVE-2011-4461 | <http://www-01.ibm.com/support/docview.wss?uid=swg21611931> |
REFERENCES:
Complete CVSS Guide
On-line Calculator V2
CVE-2013-0518
X-Force Vulnerability 83128
CVE-2013-0519
X-Force Vulnerability 82654
CVE-2013-0520
X-Force Vulnerability 83433
RELATED INFORMATION:
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
CHANGE HISTORY
3 May 2013 Original Copy Published
20 June 2013 3.3.01.23 Interim Fix 1 is now available. Security Bulletin complete.
_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _
_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an βindustry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.β IBM PROVIDES THE CVSS SCORES βAS ISβ WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
[{βProductβ:{βcodeβ:βSS6PNWβ,βlabelβ:βIBM Sterling Secure Proxyβ},βBusiness Unitβ:{βcodeβ:βBU059β,βlabelβ:βIBM Software w/o TPSβ},βComponentβ:βNot Applicableβ,βPlatformβ:[{βcodeβ:βPF025β,βlabelβ:βPlatform Independentβ}],βVersionβ:β3.4;3.3.1;3.3β,βEditionβ:ββ,βLine of Businessβ:{βcodeβ:βLOB59β,βlabelβ:βSustainability Softwareβ}}]
Vendor | Product | Version | CPE |
---|---|---|---|
ibm | sterling_secure_proxy | 3.4 | cpe:2.3:a:ibm:sterling_secure_proxy:3.4:*:*:*:*:*:*:* |
ibm | sterling_secure_proxy | 3.3.1 | cpe:2.3:a:ibm:sterling_secure_proxy:3.3.1:*:*:*:*:*:*:* |
ibm | sterling_secure_proxy | 3.3 | cpe:2.3:a:ibm:sterling_secure_proxy:3.3:*:*:*:*:*:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
EPSS
Percentile
87.6%