Security Bulletin: Multiple security vulnerabilities addressed in IBM Sterling Secure Proxy (CVE-2013-0518, CVE-2013-0519, CVE-2013-0520)

Flash (Alert)


Abstract

IBM Sterling Secure Proxy is vulnerable to spoofing and information disclosure attacks.

Content

VULNERABILITY DETAILS


CVE ID: CVE-2013-0518

DESCRIPTION: Application Pages Do Not Break Out of 3rd Party HTML Frames.

IBM Sterling Secure Proxy Configuration Manager pages permit rendering within third party HTML frames. An internal attacker could potentially control elements of the framed pages and obtain unauthorized access to data.

CVSS:
CVSS Base Score: 3.5
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83128 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N)

CVE ID: CVE-2013-0519

DESCRIPTION: Version Information Revealed In Page Title

The version of the web server is displayed in the HTTP header. This gives an attacker a head start in designing an attack specific to that web server version.

CVSS:
CVSS Base Score: 5
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/82654 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVE ID: CVE-2013-0520

DESCRIPTION: Inadequate Application Error Handling and Suppression.

Erroneous input data may result in an error condition and a java stack trace returned to the browser. An attacker can exploit this to obtain information about the application to design further attacks.

CVSS:
CVSS Base Score: 2.7
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83433 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:A/AC:L/Au:S/C:P/I:N/A:N)

AFFECTED PRODUCTS:

Sterling Secure Proxy 3.4.1
Sterling Secure Proxy 3.4.0
Sterling Secure Proxy 3.3.01
Sterling Secure Proxy 3.2.0

REMEDIATION:

VENDOR FIXES:
IBM Sterling Secure Proxy 3.4.1: Apply Fix Pack 3.4.1.7 or later
IBM Sterling Secure Proxy 3.4.0: Apply 3.4.0.6 Interim Fix 1 or Fix Pack 3.4.1.7 or later
IBM Sterling Secure Proxy 3.3.01: Apply 3.3.01.23 Interim Fix 1 or Fix Pack 3.4.1.7 or later
IBM Sterling Secure Proxy 3.2.0: No fix available. Product goes off support 6/30/2013. Customers with releases prior to SSP 3.3.01 should apply 3.3.01.23 Interim Fix 1 or Fix Pack 3.4.1.7

WORKAROUND(S):
None. Apply Fixes.

MITIGATION(S):
None known.

ADDITIONAL INFORMATION:

The fixes listed above for IBM Sterling Secure Proxy also contains fixes for the following previously reported and fixed vulnerabilities.

    Title
CVE ID Link
Jetty hashtable denial of service CVE-2011-4461 http://www-01.ibm.com/support/docview.wss?uid=swg21611931

REFERENCES:
Complete CVSS Guide
On-line Calculator V2
CVE-2013-0518
X-Force Vulnerability 83128
CVE-2013-0519
X-Force Vulnerability 82654
CVE-2013-0520
X-Force Vulnerability 83433

RELATED INFORMATION:
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

CHANGE HISTORY
3 May 2013 Original Copy Published
20 June 2013 3.3.01.23 Interim Fix 1 is now available. Security Bulletin complete.

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.


Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Rate this page:

(0 users)Average rating

Add comments

Document information


More support for:

Sterling Secure Proxy

Software version:

3.2, 3.3, 3.3.1, 3.4

Operating system(s):

All

Reference #:

1636369

Modified date:

2013-06-21

Translate my page

Machine Translation

Content navigation