-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.1199
    Security Bulletin: Potential DoS vulnerability related to WebSphere
               Commerce Search functionality (CVE-2013-2992)
                             3 September 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM WebSphere Commerce
Publisher:         IBM
Operating System:  AIX
                   IBM i
                   Linux variants
                   Solaris
                   Windows
                   i5/OS
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-2992  

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21648644

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Potential DoS vulnerability related to WebSphere Commerce 
Search functionality (CVE-2013-2992)

Flash (Alert)

Document information

WebSphere Commerce Enterprise

Security

Software version:
7.0

Operating system(s):
AIX, IBM i, Linux, Solaris, Windows, i5/OS

Software edition:
Enterprise

Reference #:
1648644

Modified date:
2013-08-30

Abstract

Depending on how WebSphere Commerce Search is configured, the site may be 
vulnerable to a denial of service attack.

Content

VULNERABILITY DETAILS:

CVE ID: CVE-2013-2992

DESCRIPTION: WebSphere Commerce Search is vulnerable to a denial of service 
attack. Depending on how search term associations are configured, a remote 
attacker could use a specially-crafted query that could impact site 
availability. The vulnerability requires a moderate level of complexity to 
exploit. This vulnerability does not apply if WebSphere Commerce is integrated
with a third party search engine.

CVSS:
CVSS Base Score: 4.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/84018 for the 
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)

AFFECTED PRODUCTS:

    WebSphere Commerce v7.0 Feature Pack 6 and Feature Pack 5
    WebSphere Commerce v7.0 Feature Pack 4 if Interim Fix JR42578 is also 
    installed

REMEDIATION:
Vendor Fix(es): Open a Problem Management Record (PMR) with IBM WebSphere 
Commerce Support to request the following Interim Fix(es) and include your 
WebSphere Commerce version including Feature Pack level:

    WebSphere Commerce v7.0 Feature Pack 6: Request Interim Fixes JR47420 and 
    JR47425.
    WebSphere Commerce v7.0 Feature Pack 5: Request Interim Fixes JR47273 and 
    JR47295. Development environments also require JR47313.
    WebSphere Commerce v7.0 Feature Pack 4 if Interim Fix JR42578 is also 
    installed: Request Interim Fix JR46013.

Workaround(s): Remove any configured search term associations

Mitigation(s): None known.

REFERENCES:

    Complete CVSS Guide
    On-line Calculator V2
    X-Force Vulnerability Database - Details for 84018
    CVE-2013-2992

RELATED INFORMATION:

    IBM Secure Engineering Web Portal
    IBM Product Security Incident Response Blog

ACKNOWLEDGEMENT: N/A

CHANGE HISTORY: N/A

*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the 
Reference section of this Flash.

Note: According to the Forum of Incident Response and Security Teams 
(FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open 
standard designed to convey vulnerability severity and help to determine 
urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" 
WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF 
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE 
RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY
VULNERABILITY.

Cross reference information 

Segment 	Product 					Component 	Platform 					Version 	Edition

Commerce 	WebSphere Commerce Professional Edition 	Security 	AIX, i5/OS, IBM i, Linux, Solaris, Windows 	7.0 		Professional Edition
Commerce 	WebSphere Commerce - Express 			Security 	i5/OS, IBM i, Linux, Windows 			7.0 		Express

Copyright and trademark information

IBM, the IBM logo and ibm.com are trademarks of International Business 
Machines Corp., registered in many jurisdictions worldwide. Other product
and service names might be trademarks of IBM or other companies. A current 
list of IBM trademarks is available on the Web at "Copyright and trademark 
information" at www.ibm.com/legal/copytrade.shtml.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=sicV
-----END PGP SIGNATURE-----