-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.0113
 Security Bulletin: GSKit certificate chain vulnerability in IBM Security
       Directory Server and Tivoli Directory Server (CVE-2013-6747)
                              29 January 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Security Directory Server
                   IBM Tivoli Directory Server
Publisher:         IBM
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-6747  

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21662902

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: GSKit certificate chain vulnerability in IBM Security 
Directory Server and Tivoli Directory Server (CVE-2013-6747)

Flash (Alert)

Document information

More support for:
IBM Security Directory Server

Software version:
6.1, 6.2, 6.3, 6.3.1

Operating system(s):
All Platforms

Reference #:
1662902

Modified date:
2014-01-24

Abstract

A vulnerability has been identified in the GSKit component utilized by IBM 
Security Directory Server (ISDS) and IBM Tivoli Directory Server (TDS). A 
malformed certificate chain can cause the ISDS or TDS client application or 
server process using GSKit to hang or crash. Remediation for the issue consists
of upgrading affected GSKit following the instructions at the end of this bulletin.

Content

VULNERABILITY DETAILS
CVE ID:
CVE-2013-6747


DESCRIPTION:
ISDS and TDS use GSKit for SSL/TLS connections. The GSKit implementation is 
vulnerable to an attack from a malformed certificate chain. Were an attacker 
to use such a certificate when initiating an SSL/TLS connection, they could 
cause the ISDS or TDS client application or server process to hang or crash.

The attack does not require local network access or authentication but 
specialized knowledge and techniques are required. An exploit would not impact 
the confidentiality of information or the integrity of data, however 
availability of the system can be compromised.

CVSS:
CVSS Base Score: 7.1
CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/89863
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:C)

AFFECTED PLATFORMS
All supported IBM Security Directory Server and Tivoli Directory Server 
versions are affected.

REMEDIATION:

    If using GSKit v7, upgrade to GSKit version 7.0.4.48 or higher as soon as possible.
    If using GSKit v8, upgrade to GSKit version 8.0.50.16 or higher as soon as possible.

Vendor Fix(es):
Tivoli Directory Server Version 	GSKit Version 	Interim Fix
Tivoli Directory Server 6.1 	GSKit v7 	6.1.0.59
Tivoli Directory Server 6.2.0 	GSKit v7 	6.2.0.34
Tivoli Directory Server 6.3.0 	GSKit v8 	6.3.0.26
IBM Security Directory Server 6.3.1 	GSKit v8 	6.3.3.1

WORKAROUNDS:
No workaround

RELATED INFORMATION:

CVE-2013-6747
http://xforce.iss.net/xforce/xfdb/89863
Complete CVSS Guide
X-Force Vulnerability Database
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

CHANGE HISTORY:

24 January 2014 	Initial publication

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Pj9H
-----END PGP SIGNATURE-----