Vulnerabilities > CVE-2013-6329 - Cryptographic Issues vulnerability in IBM products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
IBM Global Security Kit (aka GSKit), as used in Content Manager OnDemand 8.5 and 9.0 and other products, allows remote attackers to cause a denial of service via a crafted handshake during resumption of an SSLv2 session.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 7 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Nessus
NASL family General NASL id IBM_GSKIT_CVE-2013-6329.NASL description The remote host has a version of IBM Global Security Kit prior to 7.0.4.47 / 8.0.50.13. It is, therefore, affected by a denial of service vulnerability. An attacker can exploit this vulnerability by sending a specially crafted SSL request to cause an application crash or hang. last seen 2020-06-01 modified 2020-06-02 plugin id 72283 published 2014-02-04 reporter This script is Copyright (C) 2014-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/72283 title IBM Global Security Kit 7 < 7.0.4.47 / 8 < 8.0.50.13 DoS code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(72283); script_version("1.5"); script_cvs_date("Date: 2018/07/12 19:01:15"); script_cve_id("CVE-2013-6329"); script_bugtraq_id(64249); script_name(english:"IBM Global Security Kit 7 < 7.0.4.47 / 8 < 8.0.50.13 DoS"); script_summary(english:"Checks the version of GSKit"); script_set_attribute( attribute:"synopsis", value: "The remote host has a library installed that is affected by a denial of service vulnerability." ); script_set_attribute( attribute:"description", value: "The remote host has a version of IBM Global Security Kit prior to 7.0.4.47 / 8.0.50.13. It is, therefore, affected by a denial of service vulnerability. An attacker can exploit this vulnerability by sending a specially crafted SSL request to cause an application crash or hang." ); script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21662362"); script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21659716"); script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21659837"); script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21659548"); script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21663362"); script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21660286"); script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21660436"); script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21660440"); script_set_attribute(attribute:"solution", value:"Upgrade to GSKit 7.0.4.47 / 8.0.50.13 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2013/12/11"); script_set_attribute(attribute:"patch_publication_date", value:"2014/01/02"); script_set_attribute(attribute:"plugin_publication_date", value:"2014/02/04"); script_set_attribute(attribute:"potential_vulnerability", value:"true"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:global_security_kit"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"General"); script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc."); script_dependencies("ibm_gskit_installed.nasl", "ibm_gskit_installed_nix.nbin"); script_require_keys("installed_sw/IBM GSKit", "Settings/ParanoidReport"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("install_func.inc"); if (report_paranoia < 2) audit(AUDIT_PARANOID); app = "IBM GSKit"; install = get_single_install(app_name:app, exit_if_unknown_ver:TRUE); version = install['version']; path = install['path']; fix = NULL; if (version =~ '^7\\.0\\.' && ver_compare(ver:version, fix:'7.0.4.47') < 0) fix = '7.0.4.47'; else if (version =~ '^8\\.0\\.' && ver_compare(ver:version, fix:'8.0.50.13') < 0) fix = '8.0.50.13'; else audit(AUDIT_INST_PATH_NOT_VULN, app, version, path); # Default to Linux unless the RPM is not set port = 0; if (isnull(install['RPM'])) { port = get_kb_item('SMB/transport'); if (!port) port = 445; } if (report_verbosity > 0) { report = '\n Path : ' + path + '\n Installed version : ' + version + '\n Fixed version : ' + fix + '\n'; security_hole(port:port, extra:report); } else security_hole(port);
NASL family Misc. NASL id TIVOLI_ACCESS_MANAGER_EBIZ_6_1_1_8.NASL description According to its self-reported version, the install of the IBM Tivoli Access Manager for e-Business is affected by a denial of service vulnerability due to an issue when processing SSL/TLS handshakes when SSLv2 is used with session resumption. An attacker can exploit this vulnerability by sending a specially crafted SSL request to cause an application crash or hang. last seen 2020-06-01 modified 2020-06-02 plugin id 80480 published 2015-01-13 reporter This script is Copyright (C) 2015-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/80480 title IBM Tivoli Access Manager for e-Business < 6.0.0.31 / 6.1.0.12 / 6.1.1.8 or GSKit < 7.0.4.47 SSL/TLS Handshake Processing DoS code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(80480); script_version("1.4"); script_cvs_date("Date: 2018/08/01 17:36:12"); script_cve_id("CVE-2013-6329"); script_bugtraq_id(64249); script_name(english:"IBM Tivoli Access Manager for e-Business < 6.0.0.31 / 6.1.0.12 / 6.1.1.8 or GSKit < 7.0.4.47 SSL/TLS Handshake Processing DoS"); script_summary(english:"Checks the Runtime component and GSKit version."); script_set_attribute(attribute:"synopsis", value: "An access and authorization control management system installed on the remote host is affected by a denial of service vulnerability."); script_set_attribute(attribute:"description", value: "According to its self-reported version, the install of the IBM Tivoli Access Manager for e-Business is affected by a denial of service vulnerability due to an issue when processing SSL/TLS handshakes when SSLv2 is used with session resumption. An attacker can exploit this vulnerability by sending a specially crafted SSL request to cause an application crash or hang."); script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21659837"); script_set_attribute(attribute:"solution", value: "Apply the interim fix 6.0.0-ISS-TAM-IF0031 / 6.1.0-TIV-TAM-IF0012 / 6.1.1-ISS-TAM-IF0008 or later. Alternatively, upgrade GSKit to 7.0.4.47 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2013/12/13"); script_set_attribute(attribute:"patch_publication_date", value:"2013/12/06"); script_set_attribute(attribute:"plugin_publication_date", value:"2015/01/13"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:tivoli_access_manager_for_e-business"); script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:global_security_kit"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Misc."); script_copyright(english:"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc."); script_dependencies("ibm_gskit_installed_nix.nbin", "tivoli_access_manager_ebiz_installed_components_cred.nasl"); script_require_keys("installed_sw/IBM GSKit", "installed_sw/IBM Access Manager for e-Business / IBM Security Access Manager"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("install_func.inc"); tam_app = 'IBM Access Manager for e-Business / IBM Security Access Manager'; install = get_single_install(app_name:tam_app, exit_if_unknown_ver:TRUE); tam_ver = install['version']; tam_path = install['path']; tam_fix = NULL; tam_patch = NULL; # Affected : # 6.0.0.x < 6.0.0.31 # 6.1.0.x < 6.1.0.12 # 6.1.1.x < 6.1.1.8 if (tam_ver =~ "^6\.0\.0\.") { tam_fix = "6.0.0.31"; tam_patch = "6.0.0-ISS-TAM-IF0031"; } else if (tam_ver =~ "^6\.1\.0\.") { tam_fix = "6.1.0.12"; tam_patch = "6.1.0-TIV-TAM-IF0012"; } else if (tam_ver =~ "^6\.1\.1\.") { tam_fix = "6.1.1.8"; tam_patch = "6.1.1-ISS-TAM-IF0008"; } if (isnull(tam_fix) || ver_compare(ver:tam_ver, fix:tam_fix, strict:FALSE) >= 0) audit(AUDIT_INST_PATH_NOT_VULN, tam_app, tam_ver, tam_path); # Check GSKit version if TAM is not patched gsk_app = "IBM GSKit"; gsk_fix = "7.0.4.47"; # We don't bother to exit if we can't detect any GSKit installations gsk_installs = get_installs(app_name:gsk_app); gsk_report = NULL; gsk_vuln = 0; foreach gsk_install (gsk_installs[1]) { gsk_ver = gsk_install['version']; gsk_path = gsk_install['path']; if (gsk_ver =~ "^7\.0\." && ver_compare(ver:gsk_ver, fix:gsk_fix, strict:FALSE) == -1) { gsk_report += '\n Path : ' + gsk_path + '\n Installed GSKit Version : ' + gsk_ver + '\n Fixed GSKit Version : ' + gsk_fix + '\n'; gsk_vuln++; } } port = get_kb_item("SMB/transport"); if (!port) port = 445; if (report_verbosity > 0) { report = '\n' + 'The install of ' + tam_app + ' is vulnerable :' + '\n' + '\n' + ' Path : ' + tam_path + '\n' + ' Installed version : ' + tam_ver + '\n' + ' Fixed version : ' + tam_fix + '\n' + '\n' + 'Install ' + tam_patch + ' to update installation.' + '\n'; if (!isnull(gsk_report)) { instance = " instance "; is_are = " is "; if (gsk_vuln > 1) {instance = " instances "; is_are = " are ";} report += '\nAlso, the following vulnerable'+instance+'of '+gsk_app+is_are+'installed on the'+ '\nremote host :' + '\n' + gsk_report; } security_hole(port:port, extra:report); } else security_hole(port); exit(0);
NASL family Web Servers NASL id WEBSPHERE_8_0_0_9.NASL description IBM WebSphere Application Server 8.0 prior to Fix Pack 9 is running on the remote host. It is, therefore, affected by the following vulnerabilities : - A cross-site scripting flaw exists within the Administration Console, where user input is improperly validated. This could allow a remote attacker, with a specially crafted request, to execute arbitrary script code within the browser / server trust relationship. (CVE-2013-6323, PI04777 and PI04880) - A denial of service flaw exists within the Global Security Kit when handling SSLv2 resumption during the SSL/TLS handshake. This could allow a remote attacker to crash the program. (CVE-2013-6329, PI05309) - A buffer overflow flaw exists in the HTTP server with the mod_dav module when using add-ons. This could allow a remote attacker to cause a buffer overflow and a denial of service. (CVE-2013-6438, PI09345) - A cross-site scripting flaw exists within OAuth where user input is not properly validated. This could allow a remote attacker, with a specially crafted request, to execute arbitrary script code within the browser / server trust relationship. (CVE-2013-6738, PI05661) - A denial of service flaw exists within the Global Security Kit when handling X.509 certificate chain during the initiation of a SSL/TLS connection. A remote attacker, using a malformed certificate chain, could cause the client or server to crash by hanging the Global Security Kit. (CVE-2013-6747, PI09443) - A denial of service flaw exists within the Apache Commons FileUpload when parsing a content-type header for a multipart request. A remote attacker, using a specially crafted request, could crash the program. (CVE-2014-0050, PI12648, PI12926 and PI13162) - A flaw exists in the Elliptic Curve Digital Signature Algorithm implementation which could allow a malicious process to recover ECDSA nonces. (CVE-2014-0076, PI19700) - A denial of service flaw exists in the last seen 2020-06-01 modified 2020-06-02 plugin id 76995 published 2014-08-04 reporter This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/76995 title IBM WebSphere Application Server 8.0 < Fix Pack 9 Multiple Vulnerabilities code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(76995); script_version("1.10"); script_cvs_date("Date: 2019/11/25"); script_cve_id( "CVE-2013-6323", "CVE-2013-6329", "CVE-2013-6438", "CVE-2013-6738", "CVE-2013-6747", "CVE-2014-0050", "CVE-2014-0076", "CVE-2014-0098", "CVE-2014-0453", "CVE-2014-0460", "CVE-2014-0823", "CVE-2014-0857", "CVE-2014-0859", "CVE-2014-0878", "CVE-2014-0891", "CVE-2014-0963", "CVE-2014-0965", "CVE-2014-3022" ); script_bugtraq_id( 64249, 65156, 65400, 66303, 66914, 66916, 67051, 67238, 67327, 67329, 67335, 67579, 67601, 67720, 68210, 68211 ); script_name(english:"IBM WebSphere Application Server 8.0 < Fix Pack 9 Multiple Vulnerabilities"); script_summary(english:"Reads the version number from the SOAP port."); script_set_attribute(attribute:"synopsis", value: "The remote application server is affected by multiple vulnerabilities."); script_set_attribute(attribute:"description", value: "IBM WebSphere Application Server 8.0 prior to Fix Pack 9 is running on the remote host. It is, therefore, affected by the following vulnerabilities : - A cross-site scripting flaw exists within the Administration Console, where user input is improperly validated. This could allow a remote attacker, with a specially crafted request, to execute arbitrary script code within the browser / server trust relationship. (CVE-2013-6323, PI04777 and PI04880) - A denial of service flaw exists within the Global Security Kit when handling SSLv2 resumption during the SSL/TLS handshake. This could allow a remote attacker to crash the program. (CVE-2013-6329, PI05309) - A buffer overflow flaw exists in the HTTP server with the mod_dav module when using add-ons. This could allow a remote attacker to cause a buffer overflow and a denial of service. (CVE-2013-6438, PI09345) - A cross-site scripting flaw exists within OAuth where user input is not properly validated. This could allow a remote attacker, with a specially crafted request, to execute arbitrary script code within the browser / server trust relationship. (CVE-2013-6738, PI05661) - A denial of service flaw exists within the Global Security Kit when handling X.509 certificate chain during the initiation of a SSL/TLS connection. A remote attacker, using a malformed certificate chain, could cause the client or server to crash by hanging the Global Security Kit. (CVE-2013-6747, PI09443) - A denial of service flaw exists within the Apache Commons FileUpload when parsing a content-type header for a multipart request. A remote attacker, using a specially crafted request, could crash the program. (CVE-2014-0050, PI12648, PI12926 and PI13162) - A flaw exists in the Elliptic Curve Digital Signature Algorithm implementation which could allow a malicious process to recover ECDSA nonces. (CVE-2014-0076, PI19700) - A denial of service flaw exists in the 'mod_log_config' when logging a cookie with an unassigned value. A remote attacker, using a specially crafted request, can cause the program to crash. (CVE-2014-0098, PI13028) - An information disclosure flaw exists in the 'sun.security.rsa.RSAPadding' with 'PKCS#1' unpadding. This many allow a remote attacker to gain timing information intended to be protected by encryption. (CVE-2014-0453) - A flaw exists with 'com.sun.jndi.dns.DnsClient' related to the randomization of query IDs. This could allow a remote attacker to conduct spoofing attacks. (CVE-2014-0460) - A flaw exists in the Full and Liberty profiles. A remote attacker, using a specially crafted request, could gain access to arbitrary files. (CVE-2014-0823, PI05324) - An information disclosure flaw exists within the Administrative Console. This could allow a network attacker, using a specially crafted request, to gain privileged access. (CVE-2014-0857, PI07808) - A denial of service flaw exists in a web server plugin on servers configured to retry failed POST request. This could allow a remote attacker to crash the application. (CVE-2014-0859, PI08892) - An information disclosure flaw exists within Proxy and ODR servers. This could allow a remote attacker, using a specially crafted request, to gain access to potentially sensitive information. (CVE-2014-0891, PI09786) - A denial of service flaw exists within the IBM Security Access Manager for Web with the Reverse Proxy component. This could allow a remote attacker, using specially crafted TLS traffic, to cause the application on the system to become unresponsive. (CVE-2014-0963, PI17025) - An information disclosure flaw exists when handling SOAP responses. This could allow a remote attacker to potentially gain access to sensitive information. (CVE-2014-0965, PI11434) - An information disclosure flaw exists. A remote attacker, using a specially crafted URL, could gain access to potentially sensitive information. (CVE-2014-3022, PI09594)"); script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21676092"); script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21659548"); script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21663941"); script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21667254"); script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21667526"); script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21672843"); script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21673013"); script_set_attribute(attribute:"solution", value: "Apply Fix Pack 9 for version 8.0 (8.0.0.9) or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-0050"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990); script_set_attribute(attribute:"vuln_publication_date", value:"2014/05/01"); script_set_attribute(attribute:"patch_publication_date", value:"2014/06/23"); script_set_attribute(attribute:"plugin_publication_date", value:"2014/08/04"); script_set_attribute(attribute:"plugin_type", value:"remote"); script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_application_server"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Web Servers"); script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("websphere_detect.nasl"); script_require_keys("www/WebSphere"); script_require_ports("Services/www", 8880, 8881); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("http.inc"); port = get_http_port(default:8880, embedded:0); version = get_kb_item_or_exit("www/WebSphere/"+port+"/version"); if (version !~ "^8\.0([^0-9]|$)") audit(AUDIT_NOT_LISTEN, "IBM WebSphere Application Server 8.0", port); if (version =~ "^[0-9]+(\.[0-9]+)?$") audit(AUDIT_VER_NOT_GRANULAR, "IBM WebSphere Application Server", port, version); ver = split(version, sep:'.', keep:FALSE); for (i=0; i<max_index(ver); i++) ver[i] = int(ver[i]); if (ver[0] == 8 && ver[1] == 0 && ver[2] == 0 && ver[3] < 9) { set_kb_item(name:"www/"+port+"/XSS", value:TRUE); if (report_verbosity > 0) { source = get_kb_item_or_exit("www/WebSphere/"+port+"/source"); report = '\n Version source : ' + source + '\n Installed version : ' + version + '\n Fixed version : 8.0.0.9' + '\n'; security_hole(port:port, extra:report); } else security_hole(port); exit(0); } else audit(AUDIT_LISTEN_NOT_VULN, "IBM WebSphere Application Server", port, version);
NASL family Misc. NASL id IBM_INFORMIX_SERVER_SWG21660436.NASL description The remote Informix server ships with a version of IBM last seen 2020-06-01 modified 2020-06-02 plugin id 72118 published 2014-01-24 reporter This script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/72118 title Informix Server GSKit < 7.0.4.47 / 8.0.50.13 SSL/TLS DoS NASL family Web Servers NASL id WEBSPHERE_8_5_5_2.NASL description IBM WebSphere Application Server 8.5 prior to Fix Pack 8.5.5.2 appears to be running on the remote host and is, therefore, potentially affected by the following vulnerabilities : - Numerous errors exist related to the included IBM SDK for Java (based on the Oracle JDK) that could allow denial of service attacks and information disclosure. (CVE-2013-5372, CVE-2013-5780, CVE-2013-5803) - User input validation errors exist related to the Administrative console and the Oauth component that could allow cross-site scripting attacks. (CVE-2013-6725 / PM98132, CVE-2013-6323 / PI04777, CVE-2013-6738 / PI05661) - An error exists due to a failure to properly handle by web services endpoint requests that could allow denial of service attacks. (CVE-2013-6325 / PM99450, PI08267) - An error exists in the included IBM Global Security Kit related to SSL handling that could allow denial of service attacks. (CVE-2013-6329 / PI05309) - A flaw exists with the last seen 2020-06-01 modified 2020-06-02 plugin id 74235 published 2014-05-29 reporter This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/74235 title IBM WebSphere Application Server 8.5 < Fix Pack 8.5.5.2 Multiple Vulnerabilities NASL family Web Servers NASL id WEBSPHERE_7_0_0_33.NASL description IBM WebSphere Application Server 7.0 prior to Fix Pack 33 is running on the remote host. It is, therefore, affected by the following vulnerabilities : - A cross-site scripting flaw exists within the Administration Console, where user input is improperly validated. This could allow a remote attacker, with a specially crafted request, to execute arbitrary script code within the browser / server trust relationship. (CVE-2013-6323, PI04777 and PI04880) - A denial of service flaw exists within the Global Security Kit when handling SSLv2 resumption during the SSL/TLS handshake. This could allow a remote attacker to crash the program. (CVE-2013-6329, PI05309) - A buffer overflow flaw exists in the HTTP server with the mod_dav module when using add-ons. This could allow a remote attacker to cause a buffer overflow and a denial of service. (CVE-2013-6438, PI09345) - A cross-site scripting flaw exists within OAuth where user input is not properly validated. This could allow a remote attacker, with a specially crafted request, to execute arbitrary script code within the browser / server trust relationship. (CVE-2013-6738, PI05661) - A denial of service flaw exists within the Global Security Kit when handling X.509 certificate chain during the initiation of an SSL/TLS connection. A remote attacker, using a malformed certificate chain, could cause the client or server to crash by hanging the Global Security Kit. (CVE-2013-6747, PI09443) - A denial of service flaw exists within the Apache Commons FileUpload when parsing a content-type header for a multipart request. A remote attacker, using a specially crafted request, could crash the program. (CVE-2014-0050, PI12648, PI12926 and PI13162) - A denial of service flaw exists in the last seen 2020-06-01 modified 2020-06-02 plugin id 76967 published 2014-08-01 reporter This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/76967 title IBM WebSphere Application Server 7.0 < Fix Pack 33 Multiple Vulnerabilities
Seebug
bulletinFamily | exploit |
description | CVE ID:CVE-2013-6329 IBM Content Manager OnDemand是一款内容管理解决方案。 IBM Content Manager OnDemand for Multiplatform处理SSL/TLS握手过程中处理SSlv2会话恢复存在安全漏洞,允许远程攻击者利用漏洞提交特殊的请求使应用程序崩溃,造成拒绝服务攻击。 0 IBM Content Manager OnDemand for Multiplatform 8.5 IBM Content Manager OnDemand for Multiplatform 9.0 厂商补丁: IBM ----- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://www-304.ibm.com/support/docview.wss?uid=swg21659716 |
id | SSV:61143 |
last seen | 2017-11-19 |
modified | 2013-12-17 |
published | 2013-12-17 |
reporter | Root |
title | IBM Content Manager OnDemand for Multiplatform SSLv2会话恢复处理远程拒绝服务漏 |
References
- http://secunia.com/advisories/56058
- http://secunia.com/advisories/56058
- http://www-01.ibm.com/support/docview.wss?uid=swg21659548
- http://www-01.ibm.com/support/docview.wss?uid=swg21659548
- http://www-01.ibm.com/support/docview.wss?uid=swg21659716
- http://www-01.ibm.com/support/docview.wss?uid=swg21659716
- http://www-01.ibm.com/support/docview.wss?uid=swg21659837
- http://www-01.ibm.com/support/docview.wss?uid=swg21659837
- http://www-01.ibm.com/support/docview.wss?uid=swg21669554
- http://www-01.ibm.com/support/docview.wss?uid=swg21669554
- http://www-01.ibm.com/support/docview.wss?uid=swg21676091
- http://www-01.ibm.com/support/docview.wss?uid=swg21676091
- http://www-01.ibm.com/support/docview.wss?uid=swg21676092
- http://www-01.ibm.com/support/docview.wss?uid=swg21676092
- https://exchange.xforce.ibmcloud.com/vulnerabilities/88939
- https://exchange.xforce.ibmcloud.com/vulnerabilities/88939