SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Firewall)  >   IBM WebSphere DataPower Vendors:   IBM
IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service
SecurityTracker Alert ID:  1027798
SecurityTracker URL:  http://securitytracker.com/id/1027798
CVE Reference:   CVE-2012-5758, CVE-2012-5759, CVE-2012-5756   (Links to External Site)
Date:  Nov 22 2012
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2
Description:   Several vulnerabilities were reported in IBM WebSphere DataPower. A remote authenticated user can gain administrative privileges. A remote user can cause denial of service conditions.

A remote authenticated user can send specially crafted data to execute arbitrary JMX operations on the target system [CVE-2012-5759]. The vendor has assigned APAR IC85748 to this vulnerability.

A remote user can send specially crafted data to stop server processes [CVE-2012-5758]. The vendor has assigned APAR IC86908 to this vulnerability.

The product uses a common secret key for device-to-device communications. A remote user with knowledge of the key can impersonate appliance collective members [CVE-2012-5756]. The vendor has assigned APAR PM68926 to this vulnerability.

Impact:   A remote authenticated user can gain administrative privileges.

A remote user can cause server processes to stop.

A remote user can impersonate appliance collective members.

Solution:   The vendor has issued a fix.

The vendor's advisory is available at:

http://www-01.ibm.com/support/docview.wss?uid=swg21615783

Vendor URL:  www-01.ibm.com/support/docview.wss?uid=swg21615783 (Links to External Site)
Cause:   Access control error, State error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC