Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

IBM WebSphere Application Server 8.5 < 8.5.5.10 Multiple Vulnerabilities

Medium

Synopsis

The remote host is running an application server that is vulnerable to multiple attack vectors.

Description

The remote host appears to be running IBM WebSphere Application Server 8.5 prior to 8.5.5.10. Such versions are potentially affected by multiple issues :

- A flaw exists that is triggered as CRLF (Carriage Return and Line Feed) character sequences are not properly sanitized before being included in HTTP responses. This allows a remote attacker to inject additional headers into responses to conduct HTTP response splitting attacks. (OSVDB 140488) - A flaw exists that is triggered during the handling of specially crafted SIP messages. This may allow a remote attacker to cause a denial of service. (OSVDB 142506) - A flaw exists that is due to the program improperly setting the CSRFtoken cookie. This may allow an authenticated remote attacker to gain access to potentially sensitive information. (OSVDB 143034) - An overflow condition exists that is triggered as certain input is not properly validated. This may allow an authenticated remote attacker to cause a buffer overflow, potentially allowing them to bypass security restrictions and disclose sensitive information. (OSVDB 143035) - A flaw exists that is due to the program setting insecure unspecified flags on CSRF token cookies, which may allow an attacker to have an unspecified impact. No further details have been provided by the vendor. Based on past disclosures from IBM, this is likely the 'secure' and/or 'HttpOnly' flag. (OSVDB 144522)

Solution

Upgrade WebSphere Application Server to 8.5.5.10 or later.