Security Bulletin: IBM WebSphere Appliance Management Center, multiple security vulnerabilities in IBM Tivoli Integrated Portal

Flash (Alert)


Abstract

Multiple security vulnerabilities exist in the IBM Tivoli Integrated Portal component of IBM WebSphere Appliance Management Center.

Content

CVEID: CVE-2013-0464

Description: IBM Eclipse Help System, as used in multiple IBM products, is vulnerable to cross-site scripting. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.

CVSS Base Score: 4.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/81060 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)



CVEID: CVE-2012-3325

Description: IBM WebSphere Application Server could allow a remote authenticated attacker to bypass security restrictions, caused by an error when validating user credentials following application of APAR PM44303. An attacker could exploit this vulnerability to gain unauthorized administrative access to the application and potentially gain access to confidential and critical customer data.

Note: IBM WebSphere Application Server customers should consider the contextual risk to their environment when assessing the impact of this vulnerability.

CVSS Base Score: 6.0
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/77959 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:S/C:P/I:P/A:P)



CVEID: CVE-2011-4858

Description: Apache Tomcat is vulnerable to a denial of service, caused by insufficient randomization of hash data structures. By sending multiple specially-crafted HTTP POST requests to an affected application containing conflicting hash key values, a remote attacker could exploit this vulnerability to cause the consumption of CPU resources.

CVSS Base Score: 5.0
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/72016 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)



Affected Products And Versions:
IBM WebSphere Appliance Management Center v4 (all releases).


Remediation:
Upgrade to IBM WebSphere Appliance Management Center v5.0 (27 June 2013) release.


Workaround(s):
None


Mitigation(s):
Upgrade to IBM WebSphere Appliance Management Center v5.0 (27 June 2013) release.


References:
- CVE-2013-0464
- CVE-2012-3325
- CVE-2011-4858
- X-Force Vulnerability Database http://xforce.iss.net/xforce/xfdb/81060
- X-Force Vulnerability Database http://xforce.iss.net/xforce/xfdb/77959
- X-Force Vulnerability Database http://xforce.iss.net/xforce/xfdb/72016


Related Information:
- IBM Secure Engineering Web Portal
- IBM Product Security Incident Response Blog


Acknowledgement:
None


Change History:
05 July 2013: Original copy published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.


Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.


Related information

IBM WebSphere Appliance Management Center

Rate this page:

(0 users)Average rating

Add comments

Document information


More support for:

WebSphere Appliance Management Center

Software version:

4.0

Operating system(s):

AIX, Linux, Windows

Reference #:

1642791

Modified date:

2013-07-10

Translate my page

Machine Translation

Content navigation