IBM WebSphere MQ Security Vulnerability: CHLAUTH rules for clients may be bypassed

Flash (Alert)


Abstract

IBM WebSphere MQ Security Vulnerability: There is the potential for a channel authentication rule to be set for a queue manager to queue manager connection to incorrectly override channel authentication rules of other types that apply to client connections. In the scenario that a mix of open and restrictive rules are deployed this could result in clients bypassing rules which would normally prevent access or limit their authorities.

Content

VULNERABILITY DETAILS

CVE ID: CVE-2013-3019

DESCRIPTION:

There is the potential for a channel authentication rule to be set for a queue manager to queue manager connection to incorrectly override channel authentication rules of other types that apply to client connections. In the scenario that a mix of open and restrictive rules are deployed this could result in clients bypassing rules which would normally prevent access or limit their authorities.

Queue manager map channel authentication rules should have no effect on client connection channels. The vulnerability relies on a very open queue manager map rule being defined to countermand a restrictive rule of another type, for example an address map that sets NOACCESS.

The vulnerability affects all IBM WebSphere MQ 7.1 and 7.5 server platforms.

CVSS:
CVSS Base Score: 4.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/84594 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.

AFFECTED PLATFORMS:

  • IBM WebSphere MQ 7.1 server (distributed)
  • IBM WebSphere MQ 7.1 server (z/OS)
  • IBM WebSphere MQ 7.5 server (distributed)

REMEDIATION:
The recommended solution is to apply the fix for each named product as soon as practical. Please see below for information on the fixes available.

FIX
IBM WebSphere MQ 7.1 (distributed)
Apply fix pack 7.1.0.3 when available. In the interim contact IBM support and request an interim fix for APAR IC87782

IBM WebSphere MQ 7.1 (z/OS)
Apply PTF UK93935

IBM WebSphere MQ 7.5 (distributed)
Apply fix pack 7.5.0.2 when available. In the interim contact IBM support and request an interim fix for APAR IC87782

WORKAROUND:
None known; apply fixes.

Mitigation
None known

REFERENCES:
Complete CVSS Guide ( http://www.first.org/cvss/cvss-guide.html)
On-line Calculator V2 ( http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2)
X-Force Vulnerability Database ( http://xforce.iss.net/xforce/xfdb/84594)
CVE-2013-3019 ( http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3019)

CHANGE HISTORY:
14th June 2013: Original Copy Published

Note: 
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Rate this page:

(0 users)Average rating

Add comments

Document information


More support for:

WebSphere MQ
Security

Software version:

7.1, 7.1.0.1, 7.1.0.2, 7.5, 7.5.0.1

Operating system(s):

AIX, HP Itanium, HP-UX, IBM i, Linux, Linux Red Hat - i/p Series, Linux Red Hat - xSeries, Linux Red Hat - zSeries, Linux SUSE - xSeries, Linux SUSE - zSeries, Linux SuSE - i/p Series, Linux iSeries, Linux on Power, Linux zSeries, MVS/ESA, OS/390, OS/400, Solaris, UNIX, Windows, i5/OS, iSeries, z/OS

Software edition:

All Editions

Reference #:

1639448

Modified date:

2013-06-14

Translate my page

Machine Translation

Content navigation