Security Bulletin: GSKit Trust Anchor vulnerability in Tivoli Directory Server (CVE-2012-2203)

Flash (Alert)


Abstract

A vulnerability has been identified in the GSKit component utilized by Tivoli Directory Server (TDS) such that trust anchors can be inserted without detection. Remediation for the issue consists of updating GSKit 7 to version 7.0.4.41 or higher, and GSKit 8 to version 8.0.14.22 or higher.

Content

VULNERABILITY DETAILS

CVE ID: CVE-2012-2203

DESCRIPTION:
A vulnerability has been discovered with the importing of certificates when a PKCS#12 file is the source. Such certificates are used in a number of places by TDS client and server components and the GSKit components used by TDS support importing PKCS#12 files. The vulnerability exists because trust anchors can be inserted without detection. Should someone with file level access to the PKCS#12 source file succeed in adding additional trust anchors prior to the import, this may result in a successful SSL/TLS connection that would normally have been rejected due to a missing chain of trust. For example, an attacker could use a crafted certificate to establish a TLS connection to the TDS server because the certification authority trust anchor in the TDS server certificate had been compromised. The attack requires access to the PKCS#12 source file and sufficient permissions to modify that file. Specialized knowledge and techniques are required. An exploit would not impact accessibility of the compromised system, but it could impact the confidentiality of information and the integrity of data.

CVSS Base Score: 5.8
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/77280 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)

AFFECTED PLATFORMS
· All GSKit 7.0.x.x builds up to and including 7.0.4.40
· All GSKit 8.0.14.x up to and including 8.0.14.21
· All GSKit 8.0.15.x up to and including 8.0.15.3

REMEDIATION:
Tivoli Directory Server versions 6.0, 6.1 or 6.2 using GSKit 7 should update GSKit to version 7.0.4.41 or later. The following document explains how to obtain and install updates to GSKit 7 for Tivoli Directory Server:
GSKit V7 - Install, Uninstall and Upgrade instructions for Tivoli Directory Server

Tivoli Directory Server versions 6.3 using GSKit 8 should update GSKit to version 8.0.14.22 or later. The following document explains how to obtain and install updates to GSKit 8 for Tivoli Directory Server:
GSKit V8 - Install, Uninstall and Upgrade instructions for Tivoli Directory Server

WORKAROUND(S):
No workaround

MITIGATION(S):
No mitigation

REFERENCES:
· Complete CVSS Guide
· CVSS on-line Calculator V2
· X-Force Database
· CVE-2012-2203

RELATED INFORMATION:
· IBM Product Security Incident Response Program
· IBM Tivoli Directory Server Support

Date of Creation/Update Summary of Changes
2012/10/04 created

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.


Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.


Product Alias/Synonym

LDAP TDS ITDS IDS GSKit

Rate this page:

(0 users)Average rating

Add comments

Document information


More support for:

IBM Security Directory Server
General

Software version:

6.0, 6.1, 6.2, 6.3

Operating system(s):

AIX, HP Itanium, HP-UX, Linux pSeries, Linux xSeries, Linux zSeries, Solaris, Solaris Opteron, Windows 2003 server, Windows 2008 server, Windows 64bit

Software edition:

All Editions

Reference #:

1609141

Modified date:

2012-10-05

Translate my page

Machine Translation

Content navigation