Synopsis
The remote application server is affected by multiple vulnerabilities.
Description
IBM WebSphere Application Server 7.0 before Fix Pack 15 appears to be running on the remote host. As such, it is reportedly affected by the following vulnerabilities :
- A double free error in BBOOORBR control block could trigger a denial of service condition. (PM17170)
- A cross-site scripting vulnerability exists in the web container. (PM18512)
- It is possible for authenticated users to trigger a DoS condition by using Lightweight Third-Party Authentication (LTPA) tokens for authentication.
(PM18644)
- Sensitive wsadmin command parameters are included in trace files, which could result in an information disclosure vulnerability. (PM18736)
- A memory leak in 'com.ibm.ws.jsp.runtime.WASJSPStrBufferImpl' could trigger a DoS condition. (PM19500)
- It is possible to trigger a DoS condition via SAAJ API provided by the WebSphere Web services runtime.
(PM19534)
- The Service Integration Bus (SIB) messaging engine is affected by a DoS issue. (PM19834)
- The installer creates a temporary log file directory with open '777' permissions. (PM20021)
- A cross-site scripting vulnerability exists in the IVT application.(PM20393)
- User credentials are not cleared from the cache, even after an user has logged out. (PM21536)
- Trace requests are not handled correctly, which could result in an unspecified issue. (PM22860)
- A memory leak in 'org.apache.jasper.runtime.JspWriterImpl.response' could trigger a denial of service condition. (PM23029)
- Under certain conditions, SIP proxy may stop processing UDP messages, resulting in a DoS condition. (PM23115)
- Memory leak in the messaging engine could trigger a denial of service condition. (PM23626)
- Improper access is allowed to certain control servlets.
(PM24372)
- The AuthCache purge implementation is not able to purge a user in AuthCache. (PM24668)
- Incorrect security role mapping could occur while using J2EE 1.4 application. (PM25455)
- It is possible for Administrator role members to modify primary administrative id via the administrative console. (PK88606)
Solution
If using WebSphere Application Server, apply Fix Pack 15 (7.0.0.15) or later.
Otherwise, if using embedded WebSphere Application Server packaged with Tivoli Directory Server, apply the latest recommended eWAS fix pack.
Plugin Details
File Name: websphere_7_0_0_15.nasl
Supported Sensors: Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Vulnerability Information
CPE: cpe:/a:ibm:websphere_application_server
Required KB Items: www/WebSphere
Exploit Ease: No known exploits are available
Patch Publication Date: 2/28/2011
Vulnerability Publication Date: 2/28/2011
Reference Information
CVE: CVE-2011-0315, CVE-2011-0316, CVE-2011-1307, CVE-2011-1308, CVE-2011-1309, CVE-2011-1310, CVE-2011-1311, CVE-2011-1312, CVE-2011-1313, CVE-2011-1314, CVE-2011-1315, CVE-2011-1316, CVE-2011-1317, CVE-2011-1318, CVE-2011-1319, CVE-2011-1320, CVE-2011-1321, CVE-2011-1322
BID: 46736
CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990
Secunia: 42938, 43211