IBM Support

Security Bulletin: IBM Sterling B2B Integrator's session or sensitive cookies do not have the secure attribute enabled (CVE-2012-5936)

Security Bulletin


Summary

IBM Sterling B2B Integrator's session or sensitive cookies do not have the secure attribute enabled. As a result, customers who use HTTP could be vulnerable to cookie hijacking attacks.

Vulnerability Details

CVE ID: CVE-2012-5936

DESCRIPTION: IBM Sterling B2B Integrator does not set the secure attribute when it creates a session or sensitive cookies. The secure attribute is used to ensure that cookies (with the attribute set) can only be sent in an encrypted channel to reduce the likelihood of eavesdropping attacks.

CVSS:
CVSS Base Score: 5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/80401 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Affected Products and Versions

IBM Sterling B2B Integrator 5.2, 5.1 and 5.0
IBM Sterling File Gateway 2.2, 2.1 and 2.0

Remediation/Fixes

APAR IC82726.
Apply iFix 5020401_3 or apply Fix Pack 5020402 if you are running Sterling B2B Integrator 5.2 or Sterling File Gateway 2.2
Apply fix pack 5104 if you are running Sterling B2B Integrator 5.1 or Sterling File Gateway 2.1.
Apply FixPack 5010 if you are running Sterling B2B Integrator 5.0 or Sterling File Gateway 2.0

Workarounds and Mitigations

None known.

Get Notified about Future Security Bulletins

References

Off

Change History

11 March 2013: Initial Version
30 June 2013: Changed affected products section to include Sterling B2B Integrator 5.2/Sterling File Gateway 2.2 and remediation section to include 5020401_3
July 30 2013: Changed affected products section to include Sterling B2B Integrator 5.0 and remediation section to include 5010
Feb 08 2016: Updated Remediation to include 5020402 Fix Pack as one of the remediated version

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SS3JSW","label":"IBM Sterling B2B Integrator"},"Business Unit":{"code":"BU055","label":"Cognitive Applications"},"Component":"Not Applicable","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF010","label":"HP-UX"},{"code":"PF012","label":"IBM i"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"},{"code":"PF033","label":"Windows"}],"Version":"5.2;5.1","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}},{"Product":{"code":"SS4TGX","label":"IBM Sterling File Gateway"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"2.2;2.1","Edition":"All Editions","Line of Business":{"code":"LOB59","label":"Sustainability Software"}}]

Document Information

Modified date:
11 February 2020

UID

swg21627985