-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2010.0322
                        WebSphere security updates
                               6 April 2010

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           WebSphere Application Server
Publisher:         ISS
Operating System:  Windows
                   Linux variants
                   Solaris
                   AIX
Impact/Access:     Cross-site Scripting     -- Remote with User Interaction
                   Denial of Service        -- Existing Account            
                   Access Confidential Data -- Existing Account            
Resolution:        Patch/Upgrade
CVE Names:         CVE-2010-0770 CVE-2010-0769 CVE-2010-0768

Original Bulletin: 
   http://xforce.iss.net/xforce/xfdb/57182
   http://xforce.iss.net/xforce/xfdb/57185
   http://xforce.iss.net/xforce/xfdb/57164

Comment: This bulletin contains three (3) ISS Advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

WebSphere Application Server ORB client denial of service
was-orb-client-dos (57182) 	
The risk level is classified as Medium

Description:

WebSphere Application Server is vulnerable to a denial of service, caused 
by an error when handling SSL handshakes for ORB clients. A remote 
authenticated attacker could exploit this vulnerability to cause WAS ORB 
threads to hang and prevent new clients from connecting.

*CVSS:
  Base Score: 			4
  Access Vector: 		Network
  Access Complexity: 		Low
  Authentication: 		Single
  Confidentiality Impact: 	None
  Integrity Impact: 		None
  Availability Impact: 		Partial
 
  Temporal Score: 		3
  Exploitability: 		Unproven
  Remediation Level: 		Official-Fix
  Report Confidence: 		Confirmed

Consequences:

Denial of Service

Remedy:

For IBM WebSphere Application Server 7.0:
Apply the latest Fix Pack (7.0.0.9 or later) or APAR PK93653. See References.

For IBM WebSphere Application Server 6.1:
Apply the latest Fix Pack (6.1.0.31 or later) or APAR PK93653. See References.

For IBM WebSphere Application Server 6.0:
Apply the latest Fix Pack (6.0.2.41 or later) or APAR PK93653. See References.

References:

    * IBM APAR PK93653: ORB thread hangs trying to do SSL handshake with 
       remote client.
    * BID-39056: IBM WebSphere Application Server Orb Client Remote Denial 
       Of Service Vulnerability
    * CVE-2010-0770: ** RESERVED ** This candidate has been reserved by an 
       organization or individual that will use it when announcing a new 
       security problem. When the candidate has been publicized, the details 
       for this candidate will be provided.
    * SA39140: IBM WebSphere Application Server Two Vulnerabilities

Platforms Affected:

    * IBM WebSphere Application Server 6.0
    * IBM WebSphere Application Server 6.1
    * IBM WebSphere Application Server 7.0

Reported:

Mar 29, 2010

The information within this database may change without notice. Use of 
this information constitutes acceptance for use in an AS IS condition. 
There are NO warranties, implied or otherwise, with regard to this 
information or its use. Any use of this information is at the user's risk. 
In no event shall the author/distributor (IBM Internet Security Systems 
X-Force) be held liable for any damages whatsoever arising out of or in 
connection with the use or spread of this information.

For corrections or additions please email xforce@iss.net

* According to the Forum of Incident Response and Security Teams (FIRST), 
the Common Vulnerability Scoring System (CVSS) is an "industry open 
standard designed to convey vulnerability severity and help to determine 
urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" 
WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF 
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE 
RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY 
VULNERABILITY.
The information within this database may change without notice. Use of 
this information constitutes acceptance for use in an AS IS condition. 
There are NO warranties, implied or otherwise, with regard to this 
information or its use. Any use of this information is at the user's risk. 
In no event shall IBM be held liable for any damages whatsoever arising 
out of or in connection with the use or spread of this information.

About IBM Internet Security Systems
IBM Internet Security Systems is a trusted security advisor to thousands 
of the world's leading businesses and governments, helping to provide 
pre-emptive protection for networks, desktops and servers. The IBM 
Proventia? integrated security platform is designed to automatically 
protect against both known and unknown threats, helping to keep networks 
up and running and shield customers from online attacks before they impact 
business assets. IBM Internet Security Systems products and services are 
based on the proactive security intelligence of its X-Force? research and 
development team ? an unequivocal world authority in vulnerability and 
threat research. The IBM Internet Security Systems product line is also 
complemented by comprehensive Managed Security Services and Professional 
Security Services. For more information, visit the IBM Internet Security 
Systems Web site at www.iss.net or call 800-776-2362. 

- -------------------------------------------------------------------------

Websphere Application Server wsadmin scripting information disclosure
was-wsadmin-info-disclosure (57185) 	
The risk level is classified as Low

Description:

Websphere Application Server could allow a remote authenticated attacker 
to obtain sensitive information, caused by an error when a wsadmin scripting 
J2CConnectionFactory object is defined, resulting in passwords being stored 
unencrypted in the resources.xml file.IBM3

*CVSS:
  Base Score: 			3.5
  Access Vector: 		Network
  Access Complexity: 		Medium
  Authentication: 		Single
  Confidentiality Impact: 	Partial
  Integrity Impact: 		None
  Availability Impact: 		None
 
  Temporal Score: 		2.6
  Exploitability: 		Unproven
  Remediation Level: 		Official-Fix
  Report Confidence: 		Confirmed

Consequences:

Obtain Information

Remedy:

For IBM WebSphere Application Server 7.0:
Apply the latest Fix Pack (7.0.0.9 or later) or APAR PK95089. See References.

For IBM WebSphere Application Server 6.1:
Apply the latest Fix Pack (6.1.0.31 or later) or APAR PK95089. See References.

For IBM WebSphere Application Server 6.0:
Apply the latest Fix Pack (6.0.2.41 or later) or APAR PK95089. See References.

References:

    * IBM APAR PK95089: Improperly storing KeyRingPassword.
    * CVE-2010-0769: ** RESERVED ** This candidate has been reserved by an 
          organization or individual that will use it when announcing a 
          new security problem. When the candidate has been publicized, 
          the details for this candidate will be provided.
    * SA39140: IBM WebSphere Application Server Two Vulnerabilities

Platforms Affected:

    * IBM WebSphere Application Server 6.0
    * IBM WebSphere Application Server 6.1
    * IBM WebSphere Application Server 7.0

Reported:

Mar 29, 2010

The information within this database may change without notice. Use of 
this information constitutes acceptance for use in an AS IS condition. 
There are NO warranties, implied or otherwise, with regard to this 
information or its use. Any use of this information is at the user's risk. 
In no event shall the author/distributor (IBM Internet Security Systems 
X-Force) be held liable for any damages whatsoever arising out of or in 
connection with the use or spread of this information.

For corrections or additions please email xforce@iss.net

* According to the Forum of Incident Response and Security Teams (FIRST), 
the Common Vulnerability Scoring System (CVSS) is an "industry open 
standard designed to convey vulnerability severity and help to determine 
urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" 
WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF 
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE 
RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY 
VULNERABILITY.
The information within this database may change without notice. Use of 
this information constitutes acceptance for use in an AS IS condition. 
There are NO warranties, implied or otherwise, with regard to this 
information or its use. Any use of this information is at the user's risk. 
In no event shall IBM be held liable for any damages whatsoever arising 
out of or in connection with the use or spread of this information.

About IBM Internet Security Systems
IBM Internet Security Systems is a trusted security advisor to thousands 
of the world's leading businesses and governments, helping to provide 
pre-emptive protection for networks, desktops and servers. The IBM 
Proventia? integrated security platform is designed to automatically 
protect against both known and unknown threats, helping to keep networks 
up and running and shield customers from online attacks before they impact 
business assets. IBM Internet Security Systems products and services are 
based on the proactive security intelligence of its X-Force? research and 
development team ? an unequivocal world authority in vulnerability and 
threat research. The IBM Internet Security Systems product line is also 
complemented by comprehensive Managed Security Services and Professional 
Security Services. For more information, visit the IBM Internet Security 
Systems Web site at www.iss.net or call 800-776-2362.

- -------------------------------------------------------------------------

WebSphere Application Server Administration Console cross-site scripting
was-admin-console-xss (57164) 	
The risk level is classified as Medium

Description:

WebSphere Application Server is vulnerable to cross-site scripting, caused 
by improper validation of user-supplied input by the Administration Console. 
A remote attacker could exploit this vulnerability using a specially-crafted 
URL to execute script in a victim's Web browser within the security context 
of the hosting Web site, once the URL is clicked. An attacker could use this 
vulnerability to steal the victim's cookie-based authentication credentials.

*CVSS:
  Base Score: 			4.3
  Access Vector: 		Network
  Access Complexity: 		Medium
  Authentication: 		None
  Confidentiality Impact: 	None
  Integrity Impact: 		Partial
  Availability Impact: 		None
 
  Temporal Score: 		4.1
  Exploitability: 		High
  Remediation Level: 		Unavailable
  Report Confidence: 		Uncorroborated

Consequences:

Gain Access

Remedy:

For IBM WebSphere Application Server 7.0:
Apply the latest Fix Pack (7.0.0.9 or later) or APAR PK97376. See References.

For IBM WebSphere Application Server 6.1:
Apply the latest Fix Pack (6.1.0.31 or later) or APAR PK97376. See References.

For IBM WebSphere Application Server 6.0:
Apply the latest Fix Pack (6.0.2.41 or later) or APAR PK97376. See References.

References:

    * IBM APAR PK97376: Potential Security Issues in WebSphere Administration 
	Console.
    * BID-39051: IBM WebSphere Application Server Administration Console 
	Cross Site Scripting Vulnerability
    * CVE-2010-0768: ** RESERVED ** This candidate has been reserved by an 
	organization or individual that will use it when announcing a new 
	security problem. When the candidate has been publicized, the 
	details for this candidate will be provided.
    * SA39140: IBM WebSphere Application Server Two Vulnerabilities

Platforms Affected:

    * IBM WebSphere Application Server 6.0
    * IBM WebSphere Application Server 6.1
    * IBM WebSphere Application Server 7.0

Reported:

Mar 29, 2010

The information within this database may change without notice. Use of 
this information constitutes acceptance for use in an AS IS condition. 
There are NO warranties, implied or otherwise, with regard to this 
information or its use. Any use of this information is at the user's risk. 
In no event shall the author/distributor (IBM Internet Security Systems 
X-Force) be held liable for any damages whatsoever arising out of or in 
connection with the use or spread of this information.

For corrections or additions please email xforce@iss.net

* According to the Forum of Incident Response and Security Teams (FIRST), 
the Common Vulnerability Scoring System (CVSS) is an "industry open 
standard designed to convey vulnerability severity and help to determine 
urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" 
WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF 
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE 
RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY 
VULNERABILITY.
The information within this database may change without notice. Use of 
this information constitutes acceptance for use in an AS IS condition. 
There are NO warranties, implied or otherwise, with regard to this 
information or its use. Any use of this information is at the user's risk. 
In no event shall IBM be held liable for any damages whatsoever arising 
out of or in connection with the use or spread of this information.

About IBM Internet Security Systems
IBM Internet Security Systems is a trusted security advisor to thousands 
of the world's leading businesses and governments, helping to provide 
pre-emptive protection for networks, desktops and servers. The IBM 
Proventia? integrated security platform is designed to automatically 
protect against both known and unknown threats, helping to keep networks 
up and running and shield customers from online attacks before they impact 
business assets. IBM Internet Security Systems products and services are 
based on the proactive security intelligence of its X-Force? research and 
development team ? an unequivocal world authority in vulnerability and 
threat research. The IBM Internet Security Systems product line is also 
complemented by comprehensive Managed Security Services and Professional 
Security Services. For more information, visit the IBM Internet Security 
Systems Web site at www.iss.net or call 800-776-2362.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFLuq1t/iFOrG6YcBERAr28AKDJCSfMjQbYX84OZWWgg9fkcPPBNgCgxnMT
FX1hppDAFOMw8HDZwLJl7D8=
=MqjC
-----END PGP SIGNATURE-----