Vulnerabilities > CVE-2013-6329 - Cryptographic Issues vulnerability in IBM products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
ibm
CWE-310
nessus

Summary

IBM Global Security Kit (aka GSKit), as used in Content Manager OnDemand 8.5 and 9.0 and other products, allows remote attackers to cause a denial of service via a crafted handshake during resumption of an SSLv2 session.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Nessus

  • NASL familyGeneral
    NASL idIBM_GSKIT_CVE-2013-6329.NASL
    descriptionThe remote host has a version of IBM Global Security Kit prior to 7.0.4.47 / 8.0.50.13. It is, therefore, affected by a denial of service vulnerability. An attacker can exploit this vulnerability by sending a specially crafted SSL request to cause an application crash or hang.
    last seen2020-06-01
    modified2020-06-02
    plugin id72283
    published2014-02-04
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/72283
    titleIBM Global Security Kit 7 < 7.0.4.47 / 8 < 8.0.50.13 DoS
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(72283);
      script_version("1.5");
      script_cvs_date("Date: 2018/07/12 19:01:15");
    
      script_cve_id("CVE-2013-6329");
      script_bugtraq_id(64249);
    
      script_name(english:"IBM Global Security Kit 7 < 7.0.4.47 / 8 < 8.0.50.13 DoS");
      script_summary(english:"Checks the version of GSKit");
    
      script_set_attribute(
        attribute:"synopsis",
        value:
    "The remote host has a library installed that is affected by a denial of
    service vulnerability."
      );
      script_set_attribute(
        attribute:"description",
        value:
    "The remote host has a version of IBM Global Security Kit prior to
    7.0.4.47 / 8.0.50.13. It is, therefore, affected by a denial of
    service vulnerability. An attacker can exploit this vulnerability by
    sending a specially crafted SSL request to cause an application crash
    or hang."
      );
      script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21662362");
      script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21659716");
      script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21659837");
      script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21659548");
      script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21663362");
      script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21660286");
      script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21660436");
      script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21660440");
      script_set_attribute(attribute:"solution", value:"Upgrade to GSKit 7.0.4.47 / 8.0.50.13 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/12/11");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/01/02");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/02/04");
    
      script_set_attribute(attribute:"potential_vulnerability", value:"true");
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:global_security_kit");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"General");
    
      script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");
    
      script_dependencies("ibm_gskit_installed.nasl", "ibm_gskit_installed_nix.nbin");
      script_require_keys("installed_sw/IBM GSKit", "Settings/ParanoidReport");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("install_func.inc");
    
    if (report_paranoia < 2) audit(AUDIT_PARANOID);
    
    app = "IBM GSKit";
    install = get_single_install(app_name:app, exit_if_unknown_ver:TRUE);
    
    version = install['version'];
    path = install['path'];
    fix = NULL;
    
    if (version =~ '^7\\.0\\.' && ver_compare(ver:version, fix:'7.0.4.47') < 0)
      fix = '7.0.4.47';
    else if (version =~ '^8\\.0\\.' && ver_compare(ver:version, fix:'8.0.50.13') < 0)
      fix = '8.0.50.13';
    else
      audit(AUDIT_INST_PATH_NOT_VULN, app, version, path);
    
    # Default to Linux unless the RPM is not set
    port = 0;
    if (isnull(install['RPM']))
    {
      port = get_kb_item('SMB/transport');
      if (!port) port = 445;
    }
    
    if (report_verbosity > 0)
    {
      report =
      '\n  Path              : ' + path +
      '\n  Installed version : ' + version +
      '\n  Fixed version     : ' + fix + '\n';
    
      security_hole(port:port, extra:report);
    }
    else security_hole(port);
    
  • NASL familyMisc.
    NASL idTIVOLI_ACCESS_MANAGER_EBIZ_6_1_1_8.NASL
    descriptionAccording to its self-reported version, the install of the IBM Tivoli Access Manager for e-Business is affected by a denial of service vulnerability due to an issue when processing SSL/TLS handshakes when SSLv2 is used with session resumption. An attacker can exploit this vulnerability by sending a specially crafted SSL request to cause an application crash or hang.
    last seen2020-06-01
    modified2020-06-02
    plugin id80480
    published2015-01-13
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/80480
    titleIBM Tivoli Access Manager for e-Business < 6.0.0.31 / 6.1.0.12 / 6.1.1.8 or GSKit < 7.0.4.47 SSL/TLS Handshake Processing DoS
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(80480);
      script_version("1.4");
      script_cvs_date("Date: 2018/08/01 17:36:12");
    
      script_cve_id("CVE-2013-6329");
      script_bugtraq_id(64249);
    
      script_name(english:"IBM Tivoli Access Manager for e-Business < 6.0.0.31 / 6.1.0.12 / 6.1.1.8 or GSKit < 7.0.4.47 SSL/TLS Handshake Processing DoS");
      script_summary(english:"Checks the Runtime component and GSKit version.");
    
      script_set_attribute(attribute:"synopsis", value:
    "An access and authorization control management system installed on the
    remote host is affected by a denial of service vulnerability.");
      script_set_attribute(attribute:"description", value:
    "According to its self-reported version, the install of the IBM Tivoli
    Access Manager for e-Business is affected by a denial of service
    vulnerability due to an issue when processing SSL/TLS handshakes when
    SSLv2 is used with session resumption. An attacker can exploit this
    vulnerability by sending a specially crafted SSL request to cause an
    application crash or hang.");
      script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21659837");
      script_set_attribute(attribute:"solution", value:
    "Apply the interim fix 6.0.0-ISS-TAM-IF0031 / 6.1.0-TIV-TAM-IF0012 /
    6.1.1-ISS-TAM-IF0008 or later. Alternatively, upgrade GSKit to
    7.0.4.47 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/12/13");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/12/06");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/01/13");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:tivoli_access_manager_for_e-business");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:global_security_kit");
    
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Misc.");
    
      script_copyright(english:"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc.");
    
      script_dependencies("ibm_gskit_installed_nix.nbin", "tivoli_access_manager_ebiz_installed_components_cred.nasl");
      script_require_keys("installed_sw/IBM GSKit", "installed_sw/IBM Access Manager for e-Business / IBM Security Access Manager");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("install_func.inc");
    
    tam_app = 'IBM Access Manager for e-Business / IBM Security Access Manager';
    install = get_single_install(app_name:tam_app, exit_if_unknown_ver:TRUE);
    
    tam_ver   = install['version'];
    tam_path  = install['path'];
    tam_fix   = NULL;
    tam_patch = NULL;
    
    # Affected :
    # 6.0.0.x < 6.0.0.31
    # 6.1.0.x < 6.1.0.12
    # 6.1.1.x < 6.1.1.8
    if (tam_ver =~ "^6\.0\.0\.")
    {
      tam_fix   = "6.0.0.31";
      tam_patch = "6.0.0-ISS-TAM-IF0031";
    }
    else if (tam_ver =~ "^6\.1\.0\.")
    {
      tam_fix   = "6.1.0.12";
      tam_patch = "6.1.0-TIV-TAM-IF0012";
    }
    else if (tam_ver =~ "^6\.1\.1\.")
    {
      tam_fix   = "6.1.1.8";
      tam_patch = "6.1.1-ISS-TAM-IF0008";
    }
    
    if (isnull(tam_fix) || ver_compare(ver:tam_ver, fix:tam_fix, strict:FALSE) >= 0)
      audit(AUDIT_INST_PATH_NOT_VULN, tam_app, tam_ver, tam_path);
    
    # Check GSKit version if TAM is not patched
    gsk_app = "IBM GSKit";
    gsk_fix  = "7.0.4.47";
    
    # We don't bother to exit if we can't detect any GSKit installations
    gsk_installs = get_installs(app_name:gsk_app);
    gsk_report   = NULL;
    gsk_vuln     = 0;
    
    foreach gsk_install (gsk_installs[1])
    {
      gsk_ver  = gsk_install['version'];
      gsk_path = gsk_install['path'];
    
      if (gsk_ver =~ "^7\.0\." &&
        ver_compare(ver:gsk_ver, fix:gsk_fix, strict:FALSE) == -1)
      {
        gsk_report +=
          '\n  Path                    : ' + gsk_path +
          '\n  Installed GSKit Version : ' + gsk_ver  +
          '\n  Fixed GSKit Version     : ' + gsk_fix  +
          '\n';
    
        gsk_vuln++;
      }
    }
    
    port = get_kb_item("SMB/transport");
    if (!port) port = 445;
    
    if (report_verbosity > 0)
    {
      report =
        '\n' + 'The install of ' + tam_app + ' is vulnerable :' +
        '\n' +
        '\n' + '  Path              : ' + tam_path +
        '\n' + '  Installed version : ' + tam_ver  +
        '\n' + '  Fixed version     : ' + tam_fix  +
        '\n' +
        '\n' + 'Install ' + tam_patch  + ' to update installation.' +
        '\n';
    
      if (!isnull(gsk_report))
      {
        instance = " instance "; is_are   = " is ";
    
        if (gsk_vuln > 1) {instance = " instances "; is_are = " are ";}
    
        report +=
          '\nAlso, the following vulnerable'+instance+'of '+gsk_app+is_are+'installed on the'+
          '\nremote host :' +
          '\n' +
          gsk_report;
      }
    
      security_hole(port:port, extra:report);
    }
    else security_hole(port);
    exit(0);
    
  • NASL familyWeb Servers
    NASL idWEBSPHERE_8_0_0_9.NASL
    descriptionIBM WebSphere Application Server 8.0 prior to Fix Pack 9 is running on the remote host. It is, therefore, affected by the following vulnerabilities : - A cross-site scripting flaw exists within the Administration Console, where user input is improperly validated. This could allow a remote attacker, with a specially crafted request, to execute arbitrary script code within the browser / server trust relationship. (CVE-2013-6323, PI04777 and PI04880) - A denial of service flaw exists within the Global Security Kit when handling SSLv2 resumption during the SSL/TLS handshake. This could allow a remote attacker to crash the program. (CVE-2013-6329, PI05309) - A buffer overflow flaw exists in the HTTP server with the mod_dav module when using add-ons. This could allow a remote attacker to cause a buffer overflow and a denial of service. (CVE-2013-6438, PI09345) - A cross-site scripting flaw exists within OAuth where user input is not properly validated. This could allow a remote attacker, with a specially crafted request, to execute arbitrary script code within the browser / server trust relationship. (CVE-2013-6738, PI05661) - A denial of service flaw exists within the Global Security Kit when handling X.509 certificate chain during the initiation of a SSL/TLS connection. A remote attacker, using a malformed certificate chain, could cause the client or server to crash by hanging the Global Security Kit. (CVE-2013-6747, PI09443) - A denial of service flaw exists within the Apache Commons FileUpload when parsing a content-type header for a multipart request. A remote attacker, using a specially crafted request, could crash the program. (CVE-2014-0050, PI12648, PI12926 and PI13162) - A flaw exists in the Elliptic Curve Digital Signature Algorithm implementation which could allow a malicious process to recover ECDSA nonces. (CVE-2014-0076, PI19700) - A denial of service flaw exists in the
    last seen2020-06-01
    modified2020-06-02
    plugin id76995
    published2014-08-04
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/76995
    titleIBM WebSphere Application Server 8.0 < Fix Pack 9 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(76995);
      script_version("1.10");
      script_cvs_date("Date: 2019/11/25");
    
      script_cve_id(
        "CVE-2013-6323",
        "CVE-2013-6329",
        "CVE-2013-6438",
        "CVE-2013-6738",
        "CVE-2013-6747",
        "CVE-2014-0050",
        "CVE-2014-0076",
        "CVE-2014-0098",
        "CVE-2014-0453",
        "CVE-2014-0460",
        "CVE-2014-0823",
        "CVE-2014-0857",
        "CVE-2014-0859",
        "CVE-2014-0878",
        "CVE-2014-0891",
        "CVE-2014-0963",
        "CVE-2014-0965",
        "CVE-2014-3022"
      );
      script_bugtraq_id(
        64249,
        65156,
        65400,
        66303,
        66914,
        66916,
        67051,
        67238,
        67327,
        67329,
        67335,
        67579,
        67601,
        67720,
        68210,
        68211
      );
    
      script_name(english:"IBM WebSphere Application Server 8.0 < Fix Pack 9 Multiple Vulnerabilities");
      script_summary(english:"Reads the version number from the SOAP port.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote application server is affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "IBM WebSphere Application Server 8.0 prior to Fix Pack 9 is running on
    the remote host. It is, therefore, affected by the following
    vulnerabilities :
    
      - A cross-site scripting flaw exists within the
        Administration Console, where user input is improperly
        validated. This could allow a remote attacker, with a
        specially crafted request, to execute arbitrary script
        code within the browser / server trust relationship.
        (CVE-2013-6323, PI04777 and PI04880)
    
      - A denial of service flaw exists within the Global
        Security Kit when handling SSLv2 resumption during the
        SSL/TLS handshake. This could allow a remote attacker
        to crash the program. (CVE-2013-6329, PI05309)
    
      - A buffer overflow flaw exists in the HTTP server with
        the mod_dav module when using add-ons. This could allow
        a remote attacker to cause a buffer overflow and a
        denial of service. (CVE-2013-6438, PI09345)
    
      - A cross-site scripting flaw exists within OAuth where
        user input is not properly validated. This could allow
        a remote attacker, with a specially crafted request, to
        execute arbitrary script code within the browser /
        server trust relationship. (CVE-2013-6738, PI05661)
    
      - A denial of service flaw exists within the Global
        Security Kit when handling X.509 certificate chain
        during the initiation of a SSL/TLS connection. A remote
        attacker, using a malformed certificate chain, could
        cause the client or server to crash by hanging the
        Global Security Kit. (CVE-2013-6747, PI09443)
    
      - A denial of service flaw exists within the Apache
        Commons FileUpload when parsing a content-type header
        for a multipart request. A remote attacker, using a
        specially crafted request, could crash the program.
        (CVE-2014-0050, PI12648, PI12926 and PI13162)
    
      - A flaw exists in the Elliptic Curve Digital Signature
        Algorithm implementation which could allow a malicious
        process to recover ECDSA nonces.
        (CVE-2014-0076, PI19700)
    
      - A denial of service flaw exists in the 'mod_log_config'
        when logging a cookie with an unassigned value. A remote
        attacker, using a specially crafted request, can cause
        the program to crash. (CVE-2014-0098, PI13028)
    
      - An information disclosure flaw exists in the
        'sun.security.rsa.RSAPadding' with 'PKCS#1' unpadding.
        This many allow a remote attacker to gain timing
        information intended to be protected by encryption.
        (CVE-2014-0453)
    
      - A flaw exists with 'com.sun.jndi.dns.DnsClient' related
        to the randomization of query IDs. This could allow a
        remote attacker to conduct spoofing attacks.
        (CVE-2014-0460)
    
      - A flaw exists in the Full and Liberty profiles. A remote
        attacker, using a specially crafted request, could gain
        access to arbitrary files. (CVE-2014-0823, PI05324)
    
      - An information disclosure flaw exists within the
        Administrative Console. This could allow a network
        attacker, using a specially crafted request, to gain
        privileged access. (CVE-2014-0857, PI07808)
    
      - A denial of service flaw exists in a web server plugin
        on servers configured to retry failed POST request. This
        could allow a remote attacker to crash the application.
        (CVE-2014-0859, PI08892)
    
      - An information disclosure flaw exists within Proxy and
        ODR servers. This could allow a remote attacker, using a
        specially crafted request, to gain access to potentially
        sensitive information. (CVE-2014-0891, PI09786)
    
      - A denial of service flaw exists within the IBM Security
        Access Manager for Web with the Reverse Proxy component.
        This could allow a remote attacker, using specially
        crafted TLS traffic, to cause the application on the
        system to become unresponsive. (CVE-2014-0963, PI17025)
    
      - An information disclosure flaw exists when handling SOAP
        responses. This could allow a remote attacker to
        potentially gain access to sensitive information.
        (CVE-2014-0965, PI11434)
    
      - An information disclosure flaw exists. A remote
        attacker, using a specially crafted URL, could gain
        access to potentially sensitive information.
        (CVE-2014-3022, PI09594)");
      script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21676092");
      script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21659548");
      script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21663941");
      script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21667254");
      script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21667526");
      script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21672843");
      script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21673013");
      script_set_attribute(attribute:"solution", value:
    "Apply Fix Pack 9 for version 8.0 (8.0.0.9) or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-0050");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/05/01");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/06/23");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/08/04");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_application_server");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Web Servers");
    
      script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("websphere_detect.nasl");
      script_require_keys("www/WebSphere");
      script_require_ports("Services/www", 8880, 8881);
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    
    port = get_http_port(default:8880, embedded:0);
    
    version = get_kb_item_or_exit("www/WebSphere/"+port+"/version");
    if (version !~ "^8\.0([^0-9]|$)") audit(AUDIT_NOT_LISTEN, "IBM WebSphere Application Server 8.0", port);
    if (version =~ "^[0-9]+(\.[0-9]+)?$") audit(AUDIT_VER_NOT_GRANULAR, "IBM WebSphere Application Server", port, version);
    
    ver = split(version, sep:'.', keep:FALSE);
    for (i=0; i<max_index(ver); i++)
      ver[i] = int(ver[i]);
    
    if (ver[0] == 8 && ver[1] == 0 && ver[2] == 0 && ver[3] < 9)
    {
      set_kb_item(name:"www/"+port+"/XSS", value:TRUE);
    
      if (report_verbosity > 0)
      {
        source = get_kb_item_or_exit("www/WebSphere/"+port+"/source");
        report =
          '\n  Version source    : ' + source +
          '\n  Installed version : ' + version +
          '\n  Fixed version     : 8.0.0.9' +
          '\n';
        security_hole(port:port, extra:report);
      }
      else security_hole(port);
      exit(0);
    }
    else audit(AUDIT_LISTEN_NOT_VULN, "IBM WebSphere Application Server", port, version);
    
  • NASL familyMisc.
    NASL idIBM_INFORMIX_SERVER_SWG21660436.NASL
    descriptionThe remote Informix server ships with a version of IBM
    last seen2020-06-01
    modified2020-06-02
    plugin id72118
    published2014-01-24
    reporterThis script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72118
    titleInformix Server GSKit < 7.0.4.47 / 8.0.50.13 SSL/TLS DoS
  • NASL familyWeb Servers
    NASL idWEBSPHERE_8_5_5_2.NASL
    descriptionIBM WebSphere Application Server 8.5 prior to Fix Pack 8.5.5.2 appears to be running on the remote host and is, therefore, potentially affected by the following vulnerabilities : - Numerous errors exist related to the included IBM SDK for Java (based on the Oracle JDK) that could allow denial of service attacks and information disclosure. (CVE-2013-5372, CVE-2013-5780, CVE-2013-5803) - User input validation errors exist related to the Administrative console and the Oauth component that could allow cross-site scripting attacks. (CVE-2013-6725 / PM98132, CVE-2013-6323 / PI04777, CVE-2013-6738 / PI05661) - An error exists due to a failure to properly handle by web services endpoint requests that could allow denial of service attacks. (CVE-2013-6325 / PM99450, PI08267) - An error exists in the included IBM Global Security Kit related to SSL handling that could allow denial of service attacks. (CVE-2013-6329 / PI05309) - A flaw exists with the
    last seen2020-06-01
    modified2020-06-02
    plugin id74235
    published2014-05-29
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/74235
    titleIBM WebSphere Application Server 8.5 < Fix Pack 8.5.5.2 Multiple Vulnerabilities
  • NASL familyWeb Servers
    NASL idWEBSPHERE_7_0_0_33.NASL
    descriptionIBM WebSphere Application Server 7.0 prior to Fix Pack 33 is running on the remote host. It is, therefore, affected by the following vulnerabilities : - A cross-site scripting flaw exists within the Administration Console, where user input is improperly validated. This could allow a remote attacker, with a specially crafted request, to execute arbitrary script code within the browser / server trust relationship. (CVE-2013-6323, PI04777 and PI04880) - A denial of service flaw exists within the Global Security Kit when handling SSLv2 resumption during the SSL/TLS handshake. This could allow a remote attacker to crash the program. (CVE-2013-6329, PI05309) - A buffer overflow flaw exists in the HTTP server with the mod_dav module when using add-ons. This could allow a remote attacker to cause a buffer overflow and a denial of service. (CVE-2013-6438, PI09345) - A cross-site scripting flaw exists within OAuth where user input is not properly validated. This could allow a remote attacker, with a specially crafted request, to execute arbitrary script code within the browser / server trust relationship. (CVE-2013-6738, PI05661) - A denial of service flaw exists within the Global Security Kit when handling X.509 certificate chain during the initiation of an SSL/TLS connection. A remote attacker, using a malformed certificate chain, could cause the client or server to crash by hanging the Global Security Kit. (CVE-2013-6747, PI09443) - A denial of service flaw exists within the Apache Commons FileUpload when parsing a content-type header for a multipart request. A remote attacker, using a specially crafted request, could crash the program. (CVE-2014-0050, PI12648, PI12926 and PI13162) - A denial of service flaw exists in the
    last seen2020-06-01
    modified2020-06-02
    plugin id76967
    published2014-08-01
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/76967
    titleIBM WebSphere Application Server 7.0 < Fix Pack 33 Multiple Vulnerabilities

Seebug

bulletinFamilyexploit
descriptionCVE ID:CVE-2013-6329 IBM Content Manager OnDemand是一款内容管理解决方案。 IBM Content Manager OnDemand for Multiplatform处理SSL/TLS握手过程中处理SSlv2会话恢复存在安全漏洞,允许远程攻击者利用漏洞提交特殊的请求使应用程序崩溃,造成拒绝服务攻击。 0 IBM Content Manager OnDemand for Multiplatform 8.5 IBM Content Manager OnDemand for Multiplatform 9.0 厂商补丁: IBM ----- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://www-304.ibm.com/support/docview.wss?uid=swg21659716
idSSV:61143
last seen2017-11-19
modified2013-12-17
published2013-12-17
reporterRoot
titleIBM Content Manager OnDemand for Multiplatform SSLv2会话恢复处理远程拒绝服务漏