IBM Tivoli Directory Server Vulnerabilities (credentialed check)

Critical Nessus Plugin ID 53625

Synopsis

The version of IBM Tivoli Directory Server installed on the remote host contains multiple security vulnerabilities.

Description

According to its version, the installation of IBM Tivoli Directory Server on the remote host is prior to 6.0.0.67, 6.1.0.40, 6.2.0.16, or 6.3.0.3. It is, therefore, affected by one or more of the following vulnerabilities :

- A malicious LDAP request can cause a buffer overrun in the server, allowing an unauthenticated, remote attacker to execute arbitrary code within Tivoli Directory Server's server process. This vulnerability has only been recreated on 32 bit platforms. (IO14010, IO14013, IO14028, IO14046, IO14045)

- A security vulnerability has been identified in Tivoli Directory server. If the Server is configured to audit extended operations with 'Attributes sent on group evaluation extended operation' enabled (ibm-auditAttributesOnGroupEvalOp=TRUE), the audit entries for the group eval extended op will include unmasked values for sensitive data. (IO14023, IO14025, IO14028, IO14043, IO14044)

Solution

Install the appropriate fix based on the vendor's advisory :

- 6.0.0.8-TIV-ITDS-IF0009
- 6.1.0.5-TIV-ITDS-IF0003
- 6.2.0.3-TIV-ITDS-IF0002
- 6.3.0.0-TIV-ITDS-IF0003

See Also

http://www.nessus.org/u?1d3972f7

http://www.zerodayinitiative.com/advisories/ZDI-11-136/

https://www-304.ibm.com/support/docview.wss?uid=swg21496117

https://www-304.ibm.com/support/docview.wss?uid=swg21496086

Plugin Details

Severity: Critical

ID: 53625

File Name: tivoli_directory_svr_6303.nasl

Version: 1.11

Type: local

Agent: windows

Family: Windows

Published: 2011/05/02

Modified: 2018/08/01

Dependencies: 58813

Risk Information

Risk Factor: Critical

CVSSv2

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:ibm:tivoli_directory_server

Required KB Items: installed_sw/IBM Security Directory Server

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/04/01

Vulnerability Publication Date: 2011/04/01

Exploitable With

Core Impact

Reference Information

CVE: CVE-2011-1206

BID: 47121