Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2012.0932 Potential information disclosure vulnerability in TLS compression with IBM HTTP Server 28 September 2012 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM WebSphere Application Server IBM HTTP Server Publisher: IBM Operating System: AIX HP-UX Linux variants Solaris Windows Impact/Access: Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade Original Bulletin: http://www-01.ibm.com/support/docview.wss?uid=swg21611881 - --------------------------BEGIN INCLUDED TEXT-------------------- Potential information disclosure vulnerability in TLS compression with IBM HTTP Server (APAR PM72915) Flash (Alert) Document information WebSphere Application Server IBM HTTP Server Software version: 8.0, 8.0.0.1, 8.0.0.2, 8.0.0.3, 8.0.0.4, 8.5 Operating system(s): AIX, HP-UX, Linux, Solaris, Windows Software edition: Base, Developer, Enterprise, Express, Network Deployment Reference #: 1611881 Modified date: 2012-09-27 Abstract Plaintext httpOnly cookies from the session could be exposed due to a TLS compression vulnerability. Content Affected Versions: The problem affects the Distributed IBM HTTP Server component in all editions of WebSphere Application Server and bundling products: IBM HTTP Server versions 8.0.0.0 to 8.0.0.4, and 8.5.0.0. Note: The SSL transport in the WebSphere Application Server is not affected. Only the bundled IBM HTTP Server is affected. The problem does not occur on the following versions: IBM HTTP Server on z/OS, i5/OS, or IBM i operating systems. IBM HTTP Server versions 7.0, 6.1, 6.0, 2.0.x, or 1.3.x on any operating system. Problem Description: IBM HTTP Server 8.0, and later, supports TLS compression, and inadvertently has it enabled by default. Due to a vulnerability in TLS compression, IBM HTTP Server with SSL enabled could potentially expose plaintext httpOnly cookies from the session to an attacker. Solution: For affected versions of IBM HTTP Server: For V8.0.0.0 through 8.0.x.x and V8.5.0.0: Add SSLAttributeSet 445 1 to any context in the IHS configuration file that already has the SSLEnable directive - --OR-- Apply APAR Interim Fix APAR PM72915 - --OR-- Apply the appropriate Fix Pack for your version of IBM HTTP Server: Fix Pack 5 (8.0.0.5) or later (targeted to be available mid November 2012). Fix pack 1 (8.5.0.1) or later (targeted to be available late October 2012). Additional documentation: For additional details and information on WebSphere Application Server product updates: For Distributed, see Recommended fixes for WebSphere Application Server. Cross reference information Segment Product Component Platform Version Edition Application Servers WebSphere Application General AIX, Linux 8.0 All Editions Server Hypervisor Edition Copyright and trademark information IBM, the IBM logo and ibm.com are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUGUkou4yVqjM2NGpAQIu+g//efsqXijWKpCxgzYXrcsUdp/fNgCqxeOZ br4NeL3HTCwR72lxfCF8UDKY1E18oEySABpKWGH8wSsaa2zKlQcULOaAG0cON4Ga tGORmg/+5VWUhjxBPMD9nRYWrLNhU66nrVWwYBvg8aT73BnN5IrlUluu3Hqf523V vuPdobVC7E83RcEfbnYE7aXDcdILVFMkG1YHT2z0DWvjdHB2oNdQX/8Dhfc9AQUr mNKEChPWh4AfpTQHsimXdaSRL6XejKw0w4gJM+w8VB8NPB6PVdBI5uSjEhj3gpkK h76/ASUkF2CetyYoc3rSF+h03HOGBjsu0AmpQbVveDbrPAlGpeQ1Rb/iySnDqkuP e6jPtoZAkTDVTCUeRuG3jHw4H3vlCGrkQD5vT206vkSUGLWgGwXAEAPnSOTDEK1x eW0nPoy4RtQfnaGz66UlDY6Bzd+oxa9ZV94V8YgQb+1eAUS1cKaV9F8fBGYNJewL rhUuvrfK/KB96vsH23hNhvlyiUNHWHeYkmCaqcctevyl2zUqb7jAQ6idgD8h7MRm hUfx7FKMc51mkPW4VkHeAXr9KNJIUk3rRSSqlim68Tb1j1rzp9Mv3R6JP5O8Bbaj It6p8z5JOhkUJ95Vn7fyXaNEyyy9nIVfPvIQcA+TyJ9NF4CXlklOZyxtGAGovfOk inLmqZmndp4= =vWFc -----END PGP SIGNATURE-----