IBM WebSphere Application Server 6.1 < Fix Pack 21 Multiple Flaws

medium Nessus Plugin ID 35659

Synopsis

The remote application server is affected by multiple vulnerabilities.

Description

IBM WebSphere Application Server 6.1 before Fix Pack 21 appears to be running on the remote host. As such, it is reportedly affected by multiple flaws :

- Provided Performance Monitoring Infrastructure (PMI) is enabled, it may be possible for a local attacker to obtain sensitive information through 'Systemout.log' and 'ffdc' files that are written by PerfServlet.

- SSL Configuration settings attribute 'Security Level' does not correctly enforce the level of encryption used by the application server. (PK63182)

Solution

If using WebSphere Application Server, apply Fix Pack 21 (6.1.0.21) or later.

Otherwise, if using embedded WebSphere Application Server packaged with Tivoli Directory Server, apply the latest recommended eWAS fix pack.

See Also

http://www-01.ibm.com/support/docview.wss?uid=swg21404665

http://www-01.ibm.com/support/docview.wss?uid=swg27009778

http://www-01.ibm.com/support/docview.wss?&uid=swg1PK63182

http://www-01.ibm.com/support/docview.wss?uid=swg27007951#61021

Plugin Details

Severity: Medium

ID: 35659

File Name: websphere_6_1_0_21.nasl

Version: 1.13

Type: remote

Family: Web Servers

Published: 2/12/2009

Updated: 8/6/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.5

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:ibm:websphere_application_server

Required KB Items: www/WebSphere

Exploit Ease: No known exploits are available

Patch Publication Date: 12/1/2008

Reference Information

CVE: CVE-2009-0434

BID: 33700

CWE: 200