-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2012.1076
Security Vulnerabilities fixed in IBM WebSphere Application Server 8.0.0.5
                             13 November 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM WebSphere Application Server
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   Linux variants
                   Solaris
                   Windows
Impact/Access:     Overwrite Arbitrary Files -- Remote/Unauthenticated      
                   Denial of Service         -- Remote/Unauthenticated      
                   Unauthorised Access       -- Remote with User Interaction
                   Access Confidential Data  -- Existing Account            
Resolution:        Patch/Upgrade
CVE Names:         CVE-2012-3330 CVE-2012-3325 CVE-2012-3311
                   CVE-2012-3306 CVE-2012-3305 CVE-2012-3304

Reference:         ESB-2012.1044

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21615074

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Vulnerabilities fixed in IBM WebSphere Application Server 8.0.0.5 

Flash (Alert)

Abstract
Cross reference list for security vulnerabilities fixed in IBM WebSphere
Application Server Fix Pack 8.0.0.5

Content

VULNERABILITY DETAILS: 

CVE ID: CVE-2012-3304 (PM54356)

DESCRIPTION: WebSphere Application Server could allow a remote attacker to 
hijack a valid users session, caused by an error in the Administrative 
Console. An attacker could exploit this vulnerability to gain privileges of 
the victim.

CVSS:

CVSS Base Score: 6.8
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/77476 for the
current score CVSS 
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:P/I:P/A:P)

AFFECTED PLATFORMS: The following IBM WebSphere Application Server for 
distributed operating systems, IBM i operating systems, and z/OS operating 
system Versions are affected:
Version 8.5
Version 8
Version 7
Version 6.1 

REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical

Fix:
Apply a Fix Pack or PTF containing this APAR PM54356, as noted below:

For IBM WebSphere Application Server :

For V8.5:
o Install Fix Pack 1 (8.5.0.1), or later.

For V8.0 through 8.0.0.4:
o Install Fix Pack 5 (8.0.0.5), or later.

For V7.0 through 7.0.0.23:
o Install Fix Pack 25 (7.0.0.25), or later.

For V6.1.0 through 6.1.0.43:
o Install Fix Pack 45 (6.1.0.45), or later. 

Workaround(s): None

 Mitigation(s): none

CVE ID: CVE-2012-3311 (PM61388)

DESCRIPTION: WebSphere Application Server, when running on z/OS could allow a
local attacker to bypass security restrictions, caused by a failure to perform
CBIND checks when using Federated Repositories for IIOP connections using 
Optimized Local Adapters. An attacker could exploit this vulnerability via a 
client application to access or modify application data. CVSS:

CVSS Base Score: 3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/77697 for the
current score CVSS 
Environmental Score*: Undefined
CVSS String: (AV:L/AC:M/Au:S/C:P/I:P/A:N)

AFFECTED PLATFORMS: The following IBM WebSphere Application Server for z/OS 
operating system Versions are affected:
Version 8.5
Version 8
Version 7 

REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical

Fix:
Apply a Fix Pack or PTF containing this APAR PM61388, as noted below:

For IBM WebSphere Application Server

For V8.5 :
o Install Fix Pack 1 (8.5.0.1), or later.

For V8.0 through 8.0.0.4:
o Install Fix Pack 4 (8.0.0.5), or later.

For V7.0 through 7.0.0.23:
o Install Fix Pack 25 (7.0.0.25), or later.

For V6.1.0 through 6.1.0.43:
o Install Fix Pack 45 (6.1.0.45), or later.

Workaround(s): None

Mitigation(s): None

CVE ID: CVE-2012-3305 (PM62467)

DESCRIPTION: WebSphere Application Server could allow a remote attacker to 
traverse directories on the system. An attacker could exploit this 
vulnerability by deploying a specially-crafted application file to overwrite 
files outside of the application deployment directory.

CVSS:

CVSS Base Score: 5.8
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/77477 for the
current score CVSS 
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:P)

AFFECTED PLATFORMS: The following IBM WebSphere Application Server for 
distributed operating systems, IBM i operating systems, and z/OS operating 
system Versions are affected:
Version 8.5
Version 8
Version 7
Version 6.1 

REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical

Fix:
Apply a Fix Pack or PTF containing this APAR PM62467, as noted below:

For IBM WebSphere Application Server

For V8.5 :
o Install Fix Pack 1 (8.5.0.1), or later.

For V8.0 through 8.0.0.4:
o Install Fix Pack 5 (8.0.0.5), or later.

For V7.0 through 7.0.0.23:
o Install Fix Pack 25 (7.0.0.25), or later.

For V6.1.0 through 6.1.0.45:
o Install Fix Pack 47 (6.1.0.47), or later (check back for target date)

Workaround(s): None

Mitigation(s): none CVE ID: CVE-2012-3306 (PM66514)

DESCRIPTION: WebSphere Application Server could provide weaker than expected 
security caused by a failure to purge passwords from the authentication cache
when multi domain support is enabled.

CVSS:

CVSS Base Score: 4.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/77478 for the
current score CVSS 
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

AFFECTED PLATFORMS: The following IBM WebSphere Application Server for 
distributed operating systems, IBM i operating systems, and z/OS operating 
system Versions are affected:
Version 8.5
Version 8
Version 7

REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for
each named product as soon as practical Fix:

Apply a Fix Pack or PTF containing this APAR PM66514, as noted below:

For IBM WebSphere Application Server :

For V8.5:
o Install Fix Pack 1 (8.5.0.1), or later.

For V8.0 through 8.0.0.4:
o Install Fix Pack 5 (8.0.0.5), or later.

For V7.0 through 7.0.0.23:
o Install Fix Pack 25 (7.0.0.25), or later.

For V6.1.0 through 6.1.0.43:
o Install Fix Pack 45 (6.1.0.45), or later. 

Workaround(s): None

Mitigation(s): none CVE ID: CVE-2012-3325 (PM71296)

DESCRIPTION: If you have installed an Interim Fix for PM44303, or a fix pack 
containing PM44303, you have the potential for an authenticated attacker to 
bypass security restrictions, caused by an error when validating user 
credentials. This could allow a user to gain unauthorized administrative 
access to an application and potentially gain access to confidential and 
critical customer data.

For more information please refer to Flash: 
http://www-01.ibm.com/support/docview.wss?uid=swg21609067 CVSS:

CVSS Base Score: 6.0
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/77959 for the
current score CVSS 
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:S/C:P/I:P/A:P)

AFFECTED PLATFORMS: The following IBM WebSphere Application Server for 
distributed operating systems, IBM i operating systems, and z/OS operating 
system Versions are affected:
Version 8.5
Version 8
Version 7
Version 6.1 

REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical

Fix:
Apply a Fix Pack or PTF containing this APAR PM71296, as noted below:

For IBM WebSphere Application Server :

For V8.5:
o Install Fix Pack 1 (8.5.0.1), or later.

For V8.0 through 8.0.0.4:
o Install Fix Pack 5 (8.0.0.5), or later.

For V7.0 through 7.0.0.23:
o Install Fix Pack 25 (7.0.0.25), or later.

For V6.1.0 through 6.1.0.43:
o Install Fix Pack 45 (6.1.0.45), or later. 

Workaround(s): None

Mitigation(s): none CVE ID: CVE-2012-3330 (PM71319)

DESCRIPTION: WebSphere Application Server and WebSphere Virtual Enterprise are
vulnerable to a denial of service, caused by an error in the proxy server 
component. By sending a specially-crafted request, a remote attacker could 
exploit this vulnerability to cause the proxy to be marked as down and deny 
access to applications.

CVSS:

CVSS Base Score: 5.0
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/78047 for the
current score CVSS 
Environmental Score*: Undefined CVSS String: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

AFFECTED PLATFORMS: The following IBM WebSphere Application Server for 
distributed operating systems, IBM i operating systems, and z/OS operating 
system Versions are affected:
Version 8.5
Version 8
Version 7

REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical

Fix:
Apply a Fix Pack or PTF containing this APAR PM71319, as noted below:

For IBM WebSphere Application Server :

For V8.5:
o Install Fix Pack 1 (8.5.0.1), or later.

For V8.0 through 8.0.0.4:
o Install Fix Pack 5 (8.0.0.5), or later.

For V7.0 through 7.0.0.25:
o Install Fix Pack 27 (7.0.0.27), or later (targeted to be available 21
January 2013).

Workaround(s): None

Mitigation(s): none

REFERENCES: Complete CVSS Guide http://www.first.org/cvss/cvss-guide.html 
On-line Calculator V2 http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2

CHANGE HISTORY: 12 November 2012: Original copy published *The CVSS 
Environment Score is customer environment specific and will ultimately impact
the Overall CVSS Score. Customers can evaluate the impact of this 
vulnerability in their environments by accessing the links in the Reference 
section of this Flash.

Note: According to the Forum of Incident Response and Security Teams (FIRST),
the Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Copyright and trademark information IBM, the IBM logo and ibm.com are 
trademarks of International Business Machines Corp., registered in many 
jurisdictions worldwide. Other product and service names might be trademarks 
of IBM or other companies. A current list of IBM trademarks is available on 
the Web at "Copyright and trademark information" at 
www.ibm.com/legal/copytrade.shtml.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=cUBP
-----END PGP SIGNATURE-----