lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060509145432.22629.qmail@securityfocus.com>
Date: 9 May 2006 14:54:32 -0000
From: SnoBmsn@...mail.de
To: bugtraq@...urityfocus.com
Subject: IBM Websphere Application Server Multiple Vulnerabilities


Impact: Unknown
Security Bypass
Exposure of sensitive information
 
Where: From remote
 
Solution Status: Vendor Patch 

Description:
Some vulnerabilities have been reported in IBM WebSphere Application Server, where some have unknown impacts and others may disclose sensitive information or bypass certain security restrictions.

1) An unspecified security/integrity exposure exists in the HTTP request handlers.

This has been reported in version 6.0.2.x.

2) User credentials may be written into the "addNode.log" file in plain text when adding the base node into the deployment manager.

This has been reported in versions 5.0.2.x, 5.1.1.x, and 6.0.2.x.

3) An unspecified security issue affects the SOAP port.

This has been reported in versions 5.0.2.x and 6.0.2.x.

4) An unspecified vulnerability exists in the administrative console.

This has been reported in version 6.0.2.x.

5) An error in the WebSphere Common Configuration Mode and CommonArchive and J2EE Models may cause sensitive information to be displayed in the trace.

This has been reported in version 5.1.1.x.

6) A manipulated LTPA token from subjects credential can be exploited to access an EJB on Solaris systems.

Successful exploitation requires that LTPA authentication is used.

This has been reported in versions 5.0.2.x and 5.1.1.x.

7) An error may cause unintended execution of scripts when inserting certain script tags in URLs.

This has been reported in versions 5.0.2.x and 5.1.1.x.

Other issues, where some may be security-related, have also been reported.

Solution:
Apply patches.

Version 6.0.2 Fix Pack 9 (6.0.2.9):
http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24012064

Version 5.1.1 Cumulative Fix 10 ():
http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24012009

Version 5.0.2 Cumulative Fix 16 (5.0.2.16):
http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24011773

Provided and/or discovered by:
Reported by the vendor

Reported by SnoB

SnoBmsn[at]hotmail[dot]com
Cyber-Security | Cyber-Warrior


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ