Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title IBM ISS Proventia Mail Security contains multiple vulnerabilities
Informations
Name VU#659791 First vendor Publication 2012-07-25
Vendor VU-CERT Last vendor Modification 2012-07-25
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#659791

IBM ISS Proventia Mail Security contains multiple vulnerabilities

Original Release date: 25 Jul 2012 | Last revised: 25 Jul 2012

Overview

IBM ISS Proventia Mail Security contains cross-site scripting and arbitrary file read vulnerabilities.

Description

The IBM security advisories state:

    CVE-2012-2955
    "The administrative user interface contains pages where it is possible to inject arbitrary JavaScript code contained in an HTTP request query string (Reflected XSS). If the HTTP request is executed in the web interface after a user has authenticated, the attacker could access cookies, files, or session information. To be successful, this requires the attacker to have specific information about the installed product."

    CVE-2012-2202
    "An Arbitrary File Read is possible on the javatester_init.php page by passing an unvalidated parameter after authentication has occurred. It enables an administrative user to access file content otherwise inaccessible through the administrative web interface."


Additional details may be found in the full advisories linked above.

Impact

An attacker may be able to read arbitrary files or launch an XSS attack to steal cookies, execute scripts in the user's browser, etc.

Solution

Apply an Update

The IBM security advisory recommends the following.

    Lotus Protector for Mail Security 2.8.x and later

    - If automatic System Package Updates are enabled, no further action is necessary. The system will download and install the update automatically.

    - For manual System Package Updates:

    - Log in to the Management Console

    - Go to "Updates" -> "Updates & Licensing"

    - Install all pending System Package Updates

    Lotus Protector for Mail Security 2.5.x

    - Follow the instructions on http://www-01.ibm.com/support/docview.wss?uid=swg21605199 to download and install the fix.

    Lotus Protector for Mail Security 2.1.x

    - Upgrade to version 2.5.x or 2.8.x and follow the remediation steps listed above

    IBM Proventia Network Mail Security System 2.5.x and later

    - Follow the instructions on http://www-01.ibm.com/support/docview.wss?uid=swg21605199 to download and install the fix.

    IBM Proventia Network Mail Security System 2.4.x and earlier

    - Upgrade to version 2.5.x or later and follow the remediation steps listed above

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
IBM CorporationAffected25 Jun 201225 Jul 2012
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base4.3AV:N/AC:M/Au:N/C:N/I:P/A:N
Temporal3.6E:F/RL:OF/RC:C
Environmental3.6CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

  • http://www-01.ibm.com/support/docview.wss?uid=swg21605626
  • http://www-01.ibm.com/support/docview.wss?uid=swg21605630

Credit

Thanks to Offensive Security for reporting these vulnerabilities.

This document was written by Jared Allar.

Other Information

  • CVE IDs:CVE-2012-2955CVE-2012-2202
  • Date Public:20 Jul 2012
  • Date First Published:25 Jul 2012
  • Date Last Updated:25 Jul 2012
  • Document Revision:16

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.


This product is provided subject to the Notification as indicated here: http://www.us-cert.gov/legal.html#notify

Original Source

Url : http://www.kb.cert.org/vuls/id/659791

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)
50 % CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 4
Hardware 2
Os 5