Summary
The host is running IBM WebSphere Application Server and is prone to multiple vulnerabilities.
Impact
Successful exploitation will let attackers to obtain sensitive information and cause a denial of service.
Impact Level: Application
Solution
Upgrade to IBM WebSphere Application Server version 6.1.0.35 or 7.0.0.15, http://www-01.ibm.com/support/docview.wss?uid=swg24028405 http://www-01.ibm.com/support/docview.wss?uid=swg24028875
Insight
- The Administrative Scripting Tools component, when tracing is enabled, places wsadmin command parameters into the 'wsadmin.traceout' and 'trace.log' files, which allows local users to obtain potentially sensitive information by reading these files.
- A double free error which allows remote backend IIOP servers to cause a denial of service by rejecting IIOP requests at opportunistic time instants.
- The Security component allows remote authenticated users to cause a denial of service by using a Lightweight Third-Party Authentication (LTPA) token for authentication.
- The Security component does not properly delete AuthCache entries upon a logout, which might allow remote attackers to access the server by leveraging an unattended workstation.
Affected
IBM WebSphere Application Server versions 6.1.0.x before 6.1.0.35 and 7.x before 7.0.0.15
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2011-1310, CVE-2011-1313, CVE-2011-1319, CVE-2011-1320 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Ecava IntegraXor Multiple Cross-Site Scripting Vulnerabilities (Windows)
- HTTP File Server Security Bypass and Denial of Service Vulnerabilities
- Apache Tomcat 'Transfer-Encoding' Information Disclosure and Denial Of Service Vulnerabilities
- Lighttpd Trailing Slash Information Disclosure Vulnerability
- Codebrws.asp Source Disclosure Vulnerability