Flashes (Alerts)
Abstract
IMS™ Enterprise Suite SOAP Gateway V1.1, V2.1, and V2.2 security vulnerabilities in SSL connections and login processes.
Content
Security Bulletin: Multiple vulnerabilities exist in IMS Enterprise Suite SOAP Gateway (CVE-2012-5785, CVE-2013-0483)
SUMMARY: IMS™ Enterprise Suite SOAP Gateway versions 1.1, 2.1, and 2.2 contain security vulnerabilities related to SSL connections, login processes.
VULNERABILITY DETAILS:
CVE ID: CVE-2012-5785
DESCRIPTION:
IBM® IMS Enterprise Suite SOAP Gateway is vulnerable to attackers who might exploit and intercept the SSL connections to steal data sent over any network topology in which a man-in-the-middle attack is deployed.
CVSS:
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/79830 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVE ID: CVE-2013-0483
DESCRIPTION:
The login function in IMS Enterprise Suite SOAP Gateway can be exploited or misused. Login information could be sent unencrypted to the server as clear text, and it is possible for unencrypted information to be stolen. This login function in IMS Enterprise Suite SOAP Gateway has been present but not used by the program and hence has been removed from the product.
CVSS:
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/81533 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)
AFFECTED PRODUCTS:
IMS Enterprise Suite SOAP Gateway 1.1, 2.1, and 2.2
REMEDIATION:
FIX(ES):
Fix* | VRMF | Download URL |
IMS Enterprise Suite SOAP Gateway 1.1 | 1.1.0.5 | https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=swg-imsentersuite |
IMS Enterprise Suite SOAP Gateway 2.1 | 2.1.0.4 | https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=swg-imsentersuite |
IMS Enterprise Suite SOAP Gateway 2.2 | 2.2.0.1 | https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=swg-imsentersuite |
Important note: IBM strongly recommends that all System z® customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.
WORKAROUNDS: None.
MITIGATIONS: None.
REFERENCES:
Complete CVSS Guide (http://www.first.org/cvss/v2/guide)
On-line Calculator V2 (http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2)
X-Force® Vulnerability Database (https://exchange.xforce.ibmcloud.com/vulnerabilities/79830
CVE-2012-5785 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5785)
X-Force Vulnerability Database (https://exchange.xforce.ibmcloud.com/vulnerabilities/81533
CVE-2013-0483 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0483)
RELATED INFORMATION:
· IBM Secure Engineering Web Portal
· IBM Product Security Incident Response Blog
CHANGE HISTORY:
March 29, 2013: Original version published.
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.
Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
Was this topic helpful?
Document Information
Modified date:
25 September 2022
UID
swg21631537