Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2009.1139.2 IBM Rational Software Architect and Rational Application Developer Fix Pack Released 24 November 2009 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM Rational Software Architect IBM Rational Application Developer Operating System: Linux variants Windows Impact/Access: Cross-site Scripting -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2009-4052 Member content until: Wednesday, December 23 2009 Revision History: November 24 2009: Added CVE Reference November 23 2009: Initial Release OVERVIEW IBM have released Fix Pack 10 for Rational Software Architect and Rational Application Developer correcting a security vulnerability. IMPACT The vendor has provided the following information regarding this vulnerability: "Cross-site vulnerability reported against the JSF Tree Control" [1,2] MITIGATION This vulnerability has been corrected with Fix Pack 10. Users can download the Fix Pack from IBM Fix Central. [3] REFERENCES [1] Fixed APAR list for IBM Rational Application Developer for WebSphere Software version 7.0 fix packs http://www-01.ibm.com/support/docview.wss?uid=swg27012378 [2] Fixed APAR List for Rational Software Architect Version 7.0 Fix Packs http://www-01.ibm.com/support/docview.wss?uid=swg27012558 [3] IBM Support: Fix Central http://www-933.ibm.com/support/fixcentral/ AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFLC1ocNVH5XJJInbgRAvMDAJ9MezoW5AxPse2IfvrQLlCghIWuaQCdE9Yr 0XGL41eINJNJY+mAuB2hj4o= =mLR4 -----END PGP SIGNATURE-----