-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.0920
          Multiple vulnerabilities identified in IBM Sterling B2B
                 Integrator and IBM Sterling File Gateway
                                3 July 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Sterling B2B Integrator
                   Sterling File Gateway
Publisher:         IBM
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Cross-site Scripting -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-2983 CVE-2013-0455 

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg27023828
   http://www-01.ibm.com/support/docview.wss?uid=swg1IC91045

Comment: This bulletin contains two (2) IBM security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

IC92888: Security Vulnerability: Cross-Site Scripting (CVE-2013-0455)

Document information

Sterling B2B Integrator

Software version:
5.2.4

Reference #:
IC92888

Modified date:
2013-06-29

APAR status

    Closed as program error.

Error description

    Cross-Site Scripting (XSS) vulnerability is found in various
    areas of IBM Sterling B2B Integrator and IBM Sterling File
    Gateway. A remote attacker could exploit this vulnerability to
    execute a script in a victim's web browser within the security
    context of the hosting web site, once the URL is clicked. An
    attacker could use this vulnerability to steal the victim's
    cookie-based authentication credentials.

Local fix

    STRRTC - 379071

    No local workaround available.

Problem summary

    Cross-Site Scripting (XSS) vulnerability is found in various
    areas of IBM Sterling B2B Integrator and IBM Sterling File
    Gateway. A remote attacker could exploit this vulnerability to
    execute a script in a victim's web browser within the security
    context of the hosting web site, once the URL is clicked. An
    attacker could use this vulnerability to steal the victim's
    cookie-based authentication credentials.

Problem conclusion

    Resolution Summary: Security vulnerability has been resolved

    Delivered In:
    5104_1
    5020401_3

Temporary fix

Comments

APAR Information

    APAR number				    IC92888
    Reported component name		    STR B2B INTEGRA
    Reported component ID		    5725D0600
    Reported release			    524
    Status				    CLOSED PER
    PE					    NoPE
    HIPER				    NoHIPER
    Special Attention			    NoSpecatt
    Submitted date			    2013-06-06
    Closed date				    2013-06-29
    Last modified date			    2013-06-29

    APAR is sysrouted FROM one or more of the following:

    APAR is sysrouted TO one or more of the following:

Fix information

    Fixed component name		    STR B2B INTEGRA
    Fixed component ID			    5725D0600

Applicable component levels

    R510 PSY				    UP
    R524 PSY				    UP

- -----------------------------------------------------------------------------

IC91045: Security Vulnerability: Cross-Site Scripting (CVE-2013-2983)

Document information

Sterling File Gateway

Software version:
2.2

Reference #:
IC91045

Modified date:
2013-06-29

APAR status

    Closed as program error.

Error description

    Cross-Site Scripting (XSS) vulnerability is found in various
    areas of IBM Sterling B2B Integrator and IBM Sterling File
    Gateway. A remote attacker could exploit this vulnerability to
    execute a script in a victim's web browser within the security
    context of the hosting web site, once the URL is clicked. An
    attacker could use this vulnerability to steal the victim's
    cookie-based authentication credentials.

Local fix

    No workaround

Problem summary

    Cross-Site Scripting (XSS) vulnerability is found in various
    areas of IBM Sterling B2B Integrator and IBM Sterling File
    Gateway. A remote attacker could exploit this vulnerability to
    execute a script in a victim's web browser within the security
    context of the hosting web site, once the URL is clicked. An
    attacker could use this vulnerability to steal the victim's
    cookie-based authentication credentials.

Problem conclusion

    Resolution Summary: Security vulnerability has been resolved.

    Delivered In:
    5104_1
    5020401_3

Temporary fix

Comments

APAR Information

    APAR number				    IC91045
    Reported component name		    STR FILE GATEWA
    Reported component ID		    5725D0700
    Reported release			    224
    Status				    CLOSED PER
    PE					    NoPE
    HIPER				    NoHIPER
    Special Attention			    NoSpecatt
    Submitted date			    2013-03-22
    Closed date				    2013-06-29
    Last modified date			    2013-06-29

    APAR is sysrouted FROM one or more of the following:

    APAR is sysrouted TO one or more of the following:

Fix information

    Fixed component name		    STR FILE GATEWA
    Fixed component ID			    5725D0700

Applicable component levels

    R210 PSY				    UP
    R224 PSY				    UP

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBUdOoKxLndAQH1ShLAQJiEQ//XYPNlJonVDUZygEU/tqcVSDEvP6Gzc34
+8k0X8yyzlFODVlRaYRZMgAQ4ZbTr4G2Q2+WoqOZK3NbhDP4vX412fCGEQ/e9APx
RROt391I1+IPi5En+ESIAaWX8Ug+iKC5s6WrgJYbvvR8M9EkhwUMsx9qHzoyCxXd
syYMpP1+9L7RTpYhuz5NOOTAjBVsM/OFT5lLDoSG3ZpNJKbEprLyJd7ZerVxeBMe
IYdu999QO4TH3I4dmd1hEN9wd+mEj29ABsyD/cukjfglWB54A5ShyRiQ4JhXUIwZ
Uy9btaA273lK6+hLrFDLo6BCzf/m6JezGu0KNZvCn/6LYrnH5hrj8Z0nnLtpHC9Y
aQWK07VViIDpd3DEqn/smeF5bfADLka9DvfxvEhfirNaM+Oopia5EyLq1EnSQiH9
QNoXk9by8z46PZkT3ArnPmy2DJQ0bE7Fv3ec28qt+mYDdlaAKN1e/FnFoOjUx0eV
SFAPElSIsV18psCGOg5xXEtblhFOdJrfIcfKJ+RBp+pE4xgZIXiLO5PQhQgq3wrO
b6qQ/xX9dbZf1iHCsdoLGtUpqcVCRnrKRGpGdPZQeOQHfHGCDS5DXs17FIklRp+0
o1YP/4BstbgyVviQGEN6+vjFJPPuzOD0iVbTsATZz5KDHAtCtyoxKhWg6p6uDLty
mI1ckhuri1c=
=/0yV
-----END PGP SIGNATURE-----