Secunia Security Advisory - IBM has acknowledged multiple vulnerabilities in IBM WebSphere Application Server for z/OS, which can be exploited by malicious, local users to potentially disclose sensitive information and by malicious people to disclose potentially sensitive information, manipulate certain data, conduct cross-site scripting attacks, and cause a DoS (Denial of Service).
1b92b9699571ea2d5dc37936976d533f5c1fa2cfbcb3d57776389b81c124c9d6
----------------------------------------------------------------------
Secunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management
Free webinars
http://secunia.com/vulnerability_scanning/corporate/webinars/
----------------------------------------------------------------------
TITLE:
IBM WebSphere Application Server for z/OS Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA40096
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/40096/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=40096
RELEASE DATE:
2010-06-09
DISCUSS ADVISORY:
http://secunia.com/advisories/40096/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/40096/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=40096
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
IBM has acknowledged multiple vulnerabilities in IBM WebSphere
Application Server for z/OS, which can be exploited by malicious,
local users to potentially disclose sensitive information and by
malicious people to disclose potentially sensitive information,
manipulate certain data, conduct cross-site scripting attacks, and
cause a DoS (Denial of Service).
1) Sensitive information can be disclosed when SIP (Session
Initiation Protocol) tracing is enabled.
For more information see vulnerability #1:
SA39628
2) Sensitive information may be written to the "default_create.log"
file when a profile is created using zPMT and the BBOWWPFx job
completes on the target system.
3) An unspecified error can be exploited to inject links. No further
information is currently available.
4) An error in multi-threaded Multi-Processing Module (MPM) can be
exploited to disclose potentially sensitive information.
For more information see vulnerability #3:
SA38776
5) Certain unspecified input is not properly sanitised in the
administrative console before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a user's
browser session in context of an affected site.
6) A vulnerability in mod_proxy_ajp module can be exploited to cause
a DoS (Denial of Service).
For more information see vulnerability #1:
SA38776
NOTE: Certain sensitive information may also be disclosed during node
federation using the addNode "-trace" option.
SOLUTION:
Apply APARs PM08892, PM08939, PM09250, PM10270, PM10684, and PM11778
or update to Fix Pack 11 (7.0.0.11) when it becomes available.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
IBM (PM08892, PM08939, PM09250, PM10270, PM10684, PM11778, PM15829,
and PM15830):
http://www-01.ibm.com/support/docview.wss?uid=swg1PM08892
http://www-01.ibm.com/support/docview.wss?uid=swg1PM08939
http://www-01.ibm.com/support/docview.wss?uid=swg1PM10270
http://www-01.ibm.com/support/docview.wss?uid=swg1PM10684
http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829
http://www-01.ibm.com/support/docview.wss?uid=swg1PM15830
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------