Security Bulletin: GSKit Trust Anchor vulnerability in Tivoli Directory Server (CVE-2012-2203)
A vulnerability has been identified in the GSKit component utilized by Tivoli Directory Server (TDS) such that trust anchors can be inserted without detection. Remediation for the issue consists of updating GSKit 7 to version 220.127.116.11 or higher, and GSKit 8 to version 18.104.22.168 or higher.
CVE ID: CVE-2012-2203
A vulnerability has been discovered with the importing of certificates when a PKCS#12 file is the source. Such certificates are used in a number of places by TDS client and server components and the GSKit components used by TDS support importing PKCS#12 files. The vulnerability exists because trust anchors can be inserted without detection. Should someone with file level access to the PKCS#12 source file succeed in adding additional trust anchors prior to the import, this may result in a successful SSL/TLS connection that would normally have been rejected due to a missing chain of trust. For example, an attacker could use a crafted certificate to establish a TLS connection to the TDS server because the certification authority trust anchor in the TDS server certificate had been compromised. The attack requires access to the PKCS#12 source file and sufficient permissions to modify that file. Specialized knowledge and techniques are required. An exploit would not impact accessibility of the compromised system, but it could impact the confidentiality of information and the integrity of data.
CVSS Base Score: 5.8
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/77280 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)
· All GSKit 7.0.x.x builds up to and including 22.214.171.124
· All GSKit 8.0.14.x up to and including 126.96.36.199
· All GSKit 8.0.15.x up to and including 188.8.131.52
Tivoli Directory Server versions 6.0, 6.1 or 6.2 using GSKit 7 should update GSKit to version 184.108.40.206 or later. The following document explains how to obtain and install updates to GSKit 7 for Tivoli Directory Server:
GSKit V7 - Install, Uninstall and Upgrade instructions for Tivoli Directory Server
Tivoli Directory Server versions 6.3 using GSKit 8 should update GSKit to version 220.127.116.11 or later. The following document explains how to obtain and install updates to GSKit 8 for Tivoli Directory Server:
GSKit V8 - Install, Uninstall and Upgrade instructions for Tivoli Directory Server
· Complete CVSS Guide
· CVSS on-line Calculator V2
· X-Force Database
· IBM Product Security Incident Response Program
· IBM Tivoli Directory Server Support
|Date of Creation/Update||Summary of Changes|
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.
Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
LDAP TDS ITDS IDS GSKit
More support for:
IBM Security Directory Server
Software version: 6.0, 6.1, 6.2, 6.3
Operating system(s): AIX, HP-UX, Linux, Solaris, Windows
Software edition: All Editions
Reference #: 1609141
Modified date: 05 October 2012
Translate this page: