VID |
22525 |
Severity |
40 |
Port |
8880, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
IBM WebSphere Application Server 7.0 before Fix Pack 17 appears to be running on the remote host. As such, it is potentially affected by the following vulnerabilities :
- Use of an insecure XML encryption algorithm could allow for decryption of JAX-RPC or JAX-WS Web Services requests. (PM34841)
- A remote attacker can gain unspecified application access on z/OS, when a Local OS user registry or Federated Repository with RACF adapter is used. (PM35480)
Note that the fix for PM34841 is not enabled by default in order to maintain application compatibility with respect to SOAPFaults. To enable it, it is necessary to set the 'webservices.unify.faults=true' JVM custom property once the update has been installed.
* References: http://www-01.ibm.com/support/docview.wss?uid=swg24029632 http://www-01.ibm.com/support/docview.wss?uid=swg21473989 http://www-01.ibm.com/support/docview.wss?uid=swg27014463#70017
* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.
* Platforms Affected: IBM WebSphere Application Server versions 7.0 prior to 7.0.0.17 Fix Pack 17 |
Recommendation |
Upgrade to the latest version of IBM WebSphere Application Server 7.0 (Fix Pack 17 for 7.0 (7.0.0.17) or later), available from the IBM Support & downloads Web site at http://www-01.ibm.com/support/docview.wss?uid=swg27014463#70017 |
Related URL |
CVE-2011-1209,CVE-2011-1683 (CVE) |
Related URL |
46736 (SecurityFocus) |
Related URL |
(ISS) |
|