-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.1453
 Security Bulletin: IBM InfoSphere Information Server Data Quality Console
           and Information Analyzer are vulnerable to cross-site
                  request forgery attacks (CVE-2013-4056)
                              15 October 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM InfoSphere Information Server Data Quality Console
                   IBM InfoSphere Information Analyzer
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   Linux variants
                   Solaris
                   Windows
Impact/Access:     Cross-site Request Forgery -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-4056  

Reference:         ESB-2013.1451

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21652413

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: IBM InfoSphere Information Server Data Quality Console and 
Information Analyzer are vulnerable to cross-site request forgery attacks 
(CVE-2013-4056)

Flash (Alert)

Document information

InfoSphere Information Server

Software version:
8.7, 9.1

Operating system(s):
AIX, HP-UX, Linux, Solaris, Windows

Reference #:
1652413

Modified date:
2013-10-10

Abstract

Security Bulletin: IBM InfoSphere Information Server Data Quality Console and 
Information Analyzer are vulnerable to cross-site request forgery attacks 
(CVE-2013-4056)

Content

SUMMARY:

A cross-site request forgery vulnerability exists in IBM InfoSphere Information
Server Data Quality Console and Information Analyzer which can allow an 
attacker to trick a legitimate user into opening a URL that results in an 
action being taken as that user, potentially without the knowledge of that
user. Any actions taken require the user being tricked to either be previously
authenticated or to authenticate as part of the attack.

VULNERABILITY DETAILS:

CVE ID: CVE-2013-4056

CVSS:
CVSS Base Score: 4.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/86545 for the 
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

AFFECTED PRODUCTS:
IBM InfoSphere Data Quality Console Version 9.1, and Information Analyzer 
Versions 8.7, and 9.1 running on all platforms

REMEDIATION:

Fix(es):

Version 8.7:
- --Apply the IBM InfoSphere Information Server version 8.7 Fix Pack 2
- --Apply the IBM InfoSphere Information Server Information Services Framework 
(ISF) Security Patch
- --Apply the IBM InfoSphere Information Analyzer Security Patch

Version 9.1:
- --Apply the IBM InfoSphere Information Server version 9.1.2.0
- --Apply the IBM InfoSphere Information Server Information Services Framework 
(ISF) Security Patch
- --Apply the IBM InfoSphere Information Analyzer Security Patch
- --Apply the IBM InfoSphere Data Quality Console Security Patch

Note: The same fix may be listed under multiple vulnerabilities. Installing the 
fix addresses all vulnerabilities to which the fix applies. Also, some fixes 
require installing both a fix pack and a subsequent patch. While the fix pack 
must be installed first, any additional patches required may be installed in 
any order.

Workaround(s) & MITIGATION(s): None known, apply fixes

REFERENCES:
Complete CVSS Guide
On-line Calculator V2

RELATED INFORMATION:
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

ACKNOWLEDGEMENT: None

CHANGE HISTORY:
10 October 2013: Original version published

*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of 
this vulnerability in their environments by accessing the links in the Reference
 section of this Flash.

Note: According to the Forum of Incident Response and Security Teams (FIRST), 
the Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Umxx
-----END PGP SIGNATURE-----