IBM Support

Security Bulletin: IBM WebSphere Cast Iron Solution & App Connect Professional is affected by Open Source vulnerabilities

Security Bulletin


Summary

IBM WebSphere Cast Iron Solution & App Connect Professional has addressed the open source vulnerabilities.

Vulnerability Details

CVEID:   CVE-2019-12749
DESCRIPTION:   dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.
CVSS Base score: 9.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/162386 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)

Affected Products and Versions

 

WebSphere Cast Iron v 7.5.0.0, 7.5.0.1, 7.5.1.0

WebSphere Cast Iron v 7.0.0.0, 7.0.0.1,  7.0.0.2

App Connect Professional  v 7.5.2.0

App Connect Professional  v 7.5.3.0

 


Remediation/Fixes

ProductVRMFRemediation/First Fix
IBM Cast Iron7.0.0.0
7.0.0.1
7.0.0.2
7002 Fixcentral Link
IBM Cast Iron7.5.0.0
7.5.0.1
7.5.1.0
7510 fixcentral Link
App Connect Professional7.5.2.07520 Fixcentral link
App Connect Professional7.5.3.07530 Fixcentral link

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Change History

23 Dec 2019: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Document Location

Worldwide

[{"Business Unit":{"code":"BU004","label":"Hybrid Cloud"},"Product":{"code":"SS3LC4","label":"App Connect Professional"},"Component":"-","Platform":[{"code":"PF016","label":"Linux"}],"Version":"-","Edition":"-"}]

Document Information

Modified date:
10 January 2020

UID

ibm11170646