Vulnerabilities > CVE-2012-0743 - Resource Management Errors vulnerability in IBM Tivoli Directory Server
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
IBM Tivoli Directory Server (TDS) 6.3 and earlier allows remote attackers to cause a denial of service (daemon crash) via a malformed LDAP paged search request.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family Windows NASL id TIVOLI_DIRECTORY_SVR_63011.NASL description According to its version, the installation of IBM Tivoli Directory Server on the remote host is prior to 6.1.0.47 / 6.2.0.22 / 6.3.0.11. It is, therefore, affected by one or more of the following vulnerabilities : - A custom LDAP client can be created which causes IBM Tivoli Directory Server to crash by sending a malformed paged search request. (IO15707, IO16001, IO16002) - In the default Tivoli Directory Server environment, with TLS enabled, the NULL-MD5, and NULL-SHA ciphers are enabled by default. (IO16035, IO16036, IOO15761) last seen 2020-06-01 modified 2020-06-02 plugin id 58814 published 2012-04-20 reporter This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/58814 title IBM Tivoli Directory Server < 6.1.0.47 / 6.2.0.22 / 6.3.0.11 Multiple Vulnerabilities (credentialed check) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(58814); script_version("1.7"); script_cvs_date("Date: 2018/08/01 17:36:15"); script_cve_id("CVE-2012-0726", "CVE-2012-0743"); script_bugtraq_id(53043); script_name(english:"IBM Tivoli Directory Server < 6.1.0.47 / 6.2.0.22 / 6.3.0.11 Multiple Vulnerabilities (credentialed check)"); script_summary(english:"Checks the version of Tivoli Directory Server."); script_set_attribute(attribute:"synopsis", value: "The version of IBM Tivoli Directory Server contains multiple security vulnerabilities."); script_set_attribute(attribute:"description", value: "According to its version, the installation of IBM Tivoli Directory Server on the remote host is prior to 6.1.0.47 / 6.2.0.22 / 6.3.0.11. It is, therefore, affected by one or more of the following vulnerabilities : - A custom LDAP client can be created which causes IBM Tivoli Directory Server to crash by sending a malformed paged search request. (IO15707, IO16001, IO16002) - In the default Tivoli Directory Server environment, with TLS enabled, the NULL-MD5, and NULL-SHA ciphers are enabled by default. (IO16035, IO16036, IOO15761)"); # https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_tivoli_directory_server_use_of_null_ciphers_in_default_transport_layer_security_configuration_would_result_in_unencrypted_communications_cve_2012_07261?lang=en_us script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?1609f9e3"); # https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_tivoli_directory_server_paged_search_may_cause_denial_of_service_may_crash_if_paged_searches_are_enabled_cve_2012_07435?lang=en_us script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?b26c4617"); script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21591267"); script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21591272"); script_set_attribute(attribute:"solution", value: "Install the appropriate fix based on the vendor's advisory : - 6.1.0.47-ISS-ITDS-IF0047 - 6.2.0.22-ISS-ITDS-IF0022 - 6.3.0.11-ISS-ITDS-IF0011"); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2012/04/16"); script_set_attribute(attribute:"patch_publication_date", value:"2012/04/16"); script_set_attribute(attribute:"plugin_publication_date", value:"2012/04/20"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:tivoli_directory_server"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Windows"); script_copyright(english:"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc."); script_dependencies("tivoli_directory_svr_installed.nasl"); script_require_keys("installed_sw/IBM Security Directory Server"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("install_func.inc"); include("misc_func.inc"); app = "IBM Security Directory Server"; install = get_single_install(app_name:app, exit_if_unknown_ver:TRUE); version = install['version']; path = install['path']; fixed = NULL; patch = NULL; # Determine the proper fix given the version number. # 6.1 branch : 6.1.0.47 # 6.2 branch : 6.2.0.22 # 6.3 branch : 6.3.0.11 if (version =~ '^6\\.') { if (version =~ '^6\\.1\\.' && ver_compare(ver:version, fix:'6.1.0.47') == -1) { fixed = '6.1.0.47'; patch = '6.1.0.47-ISS-ITDS-IF0047'; } else if (version =~ '^6\\.2\\.' && ver_compare(ver:version, fix:'6.2.0.22') == -1) { fixed = '6.2.0.22'; patch = '6.2.0.22-ISS-ITDS-IF0022'; } else if (version =~ '^6\\.3\\.' && ver_compare(ver:version, fix:'6.3.0.11') == -1) { fixed = '6.3.0.11'; patch = '6.3.0.11-ISS-ITDS-IF0011'; } } if (isnull(fixed)) audit(AUDIT_INST_PATH_NOT_VULN, 'IBM Tivoli Directory Server', version, path); port = get_kb_item("SMB/transport"); if (!port) port = 445; if (report_verbosity > 0) { report = '\n Path : ' + path + '\n Installed version : ' + version + '\n Fixed version : ' + fixed + '\n' + '\n Install ' + patch + ' to update installation.' + '\n'; security_warning(port:port, extra:report); } else security_warning(port);
NASL family General NASL id TIVOLI_DIRECTORY_SRV_NULL_CIPHER.NASL description The IBM Tivoli Directory Server hosted on the remote host supports TLS NULL-MD5 or NULL_SHA ciphers. This allows remote, unauthenticated attackers to trigger unencrypted communication via the TLS handshake protocol. Note that this version of Directory Server likely has other vulnerabilities (i.e., CVE-2012-0743), but Nessus has not checked for those issues. last seen 2019-10-28 modified 2012-10-17 plugin id 62574 published 2012-10-17 reporter This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/62574 title IBM Tivoli Directory Server TLS NULL Cipher (uncredentialed check)
References
- http://www.ibm.com/support/docview.wss?uid=swg1IO15707
- http://www.ibm.com/support/docview.wss?uid=swg1IO16001
- http://www.ibm.com/support/docview.wss?uid=swg1IO16002
- http://www.securityfocus.com/bid/53043
- http://www.securitytracker.com/id?1026938
- http://www-01.ibm.com/support/docview.wss?uid=swg21591267