-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2012.0981
   Two vulnerabilities have been identified in IBM Lotus Notes Traveler
                              12 October 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Lotus Notes Traveler
Publisher:         IBM
Operating System:  Linux variants
                   Windows
Impact/Access:     Cross-site Request Forgery -- Remote with User Interaction
                   Cross-site Scripting       -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2012-4825 CVE-2012-4824 

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21612229

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: IBM Lotus Notes Traveler open redirect (CVE-2012-4824) and
cross-site scripting vulnerability (CVE-2012-4825)

Flash (Alert)

Abstract

IBM Lotus Notes Traveler has one open redirect vulnerability (fixed in both
8.5.3.3 Interim Fix 1 and 8.5.3 Upgrade Pack 1 Interim Fix 1) and one
cross-site scripting vulnerability (fixed in release 8.5.3.2).

Content

Note that the following vulnerabilities are related to a rare, one-time user
operation and require that the attacker have explicit knowledge of the time of
that operation.


VULNERABILITY DETAILS: IBM Lotus Notes Traveler Open Redirect Vulnerability


    CVE ID: CVE-2012-4824

    CVSS:
    Using the Common Vulnerability Scoring System (CVSS) v2, the security
    rating for this issue is:

    CVSS Base Score: 4.3
    CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/78815 for the
    current score.
    CVSS Environmental Score: Undefined
    CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

    Access Vector: Network Access Complexity: Medium
    Authentication: No Confidentiality Impact: None
    Integrity Impact: Partial Availability Impact: None


    AFFECTED PLATFORMS:

    Lotus Notes Traveler release 8.5.3 only (8.5.2 and lower are not affected)

    REMEDIATION:

    Fix:

    This issue is resolved in both 8.5.3.3. Interim Fix 1 and Interim Fix 1 for
    Notes Traveler 8.5.3 Upgrade Pack 1. You can download these Interim Fixes 
    from Fix Central via the direct links below.


    Interim Fix 1 for Notes Traveler 8.5.3.3 (released 15 September 2012)

    Platform
    	
    Fix Central ID
    	
    Download link & filename
    Windows	
    LNT_8533_IF1_WIN
    	
    Traveler_8533_IF1_Win.zip
    Linux	
    LNT_8533_IF1_LINUX
    	
    Traveler_8533_IF1_Linux.tar


    Interim Fix 1 for Notes Traveler 8.5.3 Upgrade Pack 1 (released 14
    September 2012)

    Platform
    	
    Fix Central ID
    	
    Download link & filename
    Windows	
    LNT_853_UP1_IF1_WIN
    	
    Traveler_853_UP1_IF1_Win.zip
    Linux	
    LNT_853_UP1_IF1_Linux
    	
    Traveler_853_UP1_IF1_Linux.tar

    Workaround:

    None

    Mitigation(s):

    None

VULNERABILITY DETAILS: IBM Lotus Notes Traveler Cross-Site Scripting in
ILNT.mobileconfig


    CVE ID: CVE-2012-4825

    CVSS:
    Using the Common Vulnerability Scoring System (CVSS) v2, the security
    ratings for these issues are:

    CVSS Base Score: 4.3
    CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/78816 for the
    current score.
    CVSS Environmental Score: Undefined
    CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

    Access Vector: Network Access Complexity: Medium
    Authentication: No Confidentiality Impact: None
    Integrity Impact: Partial Availability Impact: None


    AFFECTED PLATFORMS:

    Lotus Notes Traveler 8.5.3.1 and earlier.


    REMEDIATION:

    Fix:

    This issue is fixed in Fix Pack 2 for Notes Traveler 8.5.3 (released 29
    February 2012) and later releases. You should upgrade to the most current
    release available on Fix Central via the link below.

   
http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Lotus&
product=ibm/Lotus/Lotus+Notes+Traveler&release=All&platform=All&function=all

    Workaround:

    None

    Mitigation(s):

    None


References:

    CVE-2012-4824
    CVE-2012-4825
    Complete CVSS Guide
    On-line Calculator V2
    X-Force Vulnerability Database (http://xforce.iss.net/xforce/xfdb/78815)
    X-Force Vulnerability Database (http://xforce.iss.net/xforce/xfdb/78816)



RELATED INFORMATION:

    IBM Secure Engineering Web Portal
    IBM Product Security Incident Response Blog


ACKNOWLEDGEMENT:
These vulnerabilities were reported to IBM by researcher Eugene Dokukin
(MustLive). For further information, refer to the following Web site:
http://websecurity.com.ua/5839/


Copyright and trademark information

IBM, the IBM logo and ibm.com are trademarks of International Business Machines
Corp., registered in many jurisdictions worldwide. Other product and service
names might be trademarks of IBM or other companies. A current list of IBM
trademarks is available on the Web at "Copyright and trademark information" at
www.ibm.com/legal/copytrade.shtml.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=wfSE
-----END PGP SIGNATURE-----