IBM Tivoli Access Manager for e-Business < 6.0.0.33 / 6.1.0.14 / 6.1.1.10 SSL Multiple Vulnerabilities - Nessus
Low Plugin ID: 80479This page contains detailed information about the IBM Tivoli Access Manager for e-Business < 6.0.0.33 / 6.1.0.14 / 6.1.1.10 SSL Multiple Vulnerabilities Nessus plugin including available exploits and PoCs found on GitHub, in Metasploit or Exploit-DB for verifying of this vulnerability.
Plugin Overview
ID: 80479
Name: IBM Tivoli Access Manager for e-Business < 6.0.0.33 / 6.1.0.14 / 6.1.1.10 SSL Multiple Vulnerabilities
Filename: tivoli_access_manager_ebiz_6_1_1_10.nasl
Vulnerability Published: 2014-05-06
This Plugin Published: 2015-01-13
Last Modification Time: 2019-11-25
Plugin Version: 1.5
Plugin Type: local
Plugin Family: Misc.
Dependencies:
tivoli_access_manager_ebiz_installed_components_cred.nasl
Required KB Items [?]: installed_sw/IBM Access Manager for e-Business / IBM Security Access Manager
Vulnerability Information
Severity: Low
Vulnerability Published: 2014-05-06
Patch Published: 2014-05-02
CVE [?]: CVE-2014-0076, CVE-2014-0963
CPE [?]: cpe:/a:ibm:tivoli_access_manager_for_e-business
Synopsis
An access and authorization control management system installed on the remote host is affected by multiple vulnerabilities.
Description
According to its self-reported version, the install of the IBM Tivoli Access Manager for e-Business is affected by multiple vulnerabilities :
- An error exists related to the implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA) that allows nonce disclosure via the 'FLUSH+RELOAD' cache side-channel attack. (CVE-2014-0076)
- A denial of service vulnerability exists that allows an attacker, using a specially crafted SSL request, to cause the host to become unresponsive. Note that this issue only affects the WebSEAL component and a workaround is available. (CVE-2014-0963)
Solution
Apply the interim fix 6.0.0-ISS-TAM-IF0033 / 6.1.0-ISS-TAM-IF0014 / 6.1.1-ISS-TAM-IF0010 or later.
Public Exploits
Target Network Port(s): N/A
Target Asset(s): N/A
Exploit Available: True (GitHub)
Exploit Ease: Exploits (PoCs) are available
Here's the list of publicly known exploits and PoCs for verifying the IBM Tivoli Access Manager for e-Business < 6.0.0.33 / 6.1.0.14 / 6.1.1.10 SSL Multiple Vulnerabilities vulnerability:
- GitHub: https://github.com/epsylon/orb
[CVE-2014-0963]
Before running any exploit against any system, make sure you are authorized by the owner of the target system(s) to perform such activity. In any other case, this would be considered as an illegal activity.
WARNING: Beware of using unverified exploits from sources such as GitHub or Exploit-DB. These exploits and PoCs could contain malware. For more information, see how to use exploits safely.
Risk Information
CVSS Score Source [?]: CVE-2014-0076
CVSS V2 Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C
CVSS Base Score: | 1.9 (Low) |
Impact Subscore: | 2.9 |
Exploitability Subscore: | 3.4 |
CVSS Temporal Score: | 1.4 (Low) |
CVSS Environmental Score: | NA (None) |
Modified Impact Subscore: | NA |
Overall CVSS Score: | 1.4 (Low) |
Go back to menu.
Plugin Source
This is the tivoli_access_manager_ebiz_6_1_1_10.nasl nessus plugin source code. This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(80479);
script_version("1.5");
script_cvs_date("Date: 2019/11/25");
script_cve_id("CVE-2014-0076", "CVE-2014-0963");
script_bugtraq_id(66363, 67238);
script_name(english:"IBM Tivoli Access Manager for e-Business < 6.0.0.33 / 6.1.0.14 / 6.1.1.10 SSL Multiple Vulnerabilities");
script_summary(english:"Checks the Runtime component version.");
script_set_attribute(attribute:"synopsis", value:
"An access and authorization control management system installed on the
remote host is affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, the install of the IBM Tivoli
Access Manager for e-Business is affected by multiple vulnerabilities
:
- An error exists related to the implementation of the
Elliptic Curve Digital Signature Algorithm (ECDSA) that
allows nonce disclosure via the 'FLUSH+RELOAD' cache
side-channel attack. (CVE-2014-0076)
- A denial of service vulnerability exists that allows an
attacker, using a specially crafted SSL request, to
cause the host to become unresponsive. Note that this
issue only affects the WebSEAL component and a
workaround is available. (CVE-2014-0963)");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21672950");
script_set_attribute(attribute:"see_also", value:"https://www-01.ibm.com/support/docview.wss?uid=swg21673008");
script_set_attribute(attribute:"solution", value:
"Apply the interim fix 6.0.0-ISS-TAM-IF0033 / 6.1.0-ISS-TAM-IF0014 /
6.1.1-ISS-TAM-IF0010 or later.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:P/I:N/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-0076");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2014/05/06");
script_set_attribute(attribute:"patch_publication_date", value:"2014/05/02");
script_set_attribute(attribute:"plugin_publication_date", value:"2015/01/13");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:tivoli_access_manager_for_e-business");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Misc.");
script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("tivoli_access_manager_ebiz_installed_components_cred.nasl");
script_require_keys("installed_sw/IBM Access Manager for e-Business / IBM Security Access Manager");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("install_func.inc");
app = 'IBM Access Manager for e-Business / IBM Security Access Manager';
install = get_single_install(app_name:app, exit_if_unknown_ver:TRUE);
ver = install['version'];
fix = NULL;
no_fix = FALSE;
# Affected :
# 5.1.0.x (no longer supported)
# 6.0.0.x < 6.0.0.33
# 6.1.0.x < 6.1.0.14
# 6.1.1.x < 6.1.1.10
if (ver =~ "^5\.1\.0([^0-9]|$)")
{
fix = "Refer to the advisory.";
no_fix = TRUE;
}
else if (ver =~ "^6\.0\.0\.")
fix = "6.0.0.33";
else if (ver =~ "^6\.1\.0\.")
fix = "6.1.0.14";
else if (ver =~ "^6\.1\.1\.")
fix = "6.1.1.10";
else
audit(AUDIT_NOT_INST, app + " ver 5.1.0.x / 6.0.0.x / 6.1.0.x / 6.1.1.x");
if (no_fix || ver_compare(ver:ver, fix:fix, strict:FALSE) < 0)
{
port = 0;
if (report_verbosity > 0)
{
report =
'\n' +
'\n Installed version : ' + ver +
'\n Fixed version : ' + fix +
'\n';
security_note(port:port, extra:report);
}
else security_note(port);
}
else audit(AUDIT_INST_VER_NOT_VULN, app, ver);
The latest version of this script can be found in these locations depending on your platform:
- Linux / Unix:
/opt/nessus/lib/nessus/plugins/tivoli_access_manager_ebiz_6_1_1_10.nasl
- Windows:
C:\ProgramData\Tenable\Nessus\nessus\plugins\tivoli_access_manager_ebiz_6_1_1_10.nasl
- Mac OS X:
/Library/Nessus/run/lib/nessus/plugins/tivoli_access_manager_ebiz_6_1_1_10.nasl
Go back to menu.
How to Run
Here is how to run the IBM Tivoli Access Manager for e-Business < 6.0.0.33 / 6.1.0.14 / 6.1.1.10 SSL Multiple Vulnerabilities as a standalone plugin via the Nessus web user interface (https://localhost:8834/):
- Click to start a New Scan.
- Select Advanced Scan.
- Navigate to the Plugins tab.
- On the top right corner click to Disable All plugins.
- On the left side table select Misc. plugin family.
- On the right side table select IBM Tivoli Access Manager for e-Business < 6.0.0.33 / 6.1.0.14 / 6.1.1.10 SSL Multiple Vulnerabilities plugin ID 80479.
- Specify the target on the Settings tab and click to Save the scan.
- Run the scan.
Here are a few examples of how to run the plugin in the command line. Note that the examples below demonstrate the usage on the Linux / Unix platform.
Basic usage:
/opt/nessus/bin/nasl tivoli_access_manager_ebiz_6_1_1_10.nasl -t <IP/HOST>
Run the plugin with audit trail message on the console:
/opt/nessus/bin/nasl -a tivoli_access_manager_ebiz_6_1_1_10.nasl -t <IP/HOST>
Run the plugin with trace script execution written to the console (useful for debugging):
/opt/nessus/bin/nasl -T - tivoli_access_manager_ebiz_6_1_1_10.nasl -t <IP/HOST>
Run the plugin with using a state file for the target and updating it (useful for running multiple plugins on the target):
/opt/nessus/bin/nasl -K /tmp/state tivoli_access_manager_ebiz_6_1_1_10.nasl -t <IP/HOST>
Go back to menu.
References
BID | SecurityFocus Bugtraq ID: See also:
- https://www.tenable.com/plugins/nessus/80479
- https://www-01.ibm.com/support/docview.wss?uid=swg21673008
- http://www-01.ibm.com/support/docview.wss?uid=swg21672950
- https://vulners.com/nessus/TIVOLI_ACCESS_MANAGER_EBIZ_6_1_1_10.NASL
- 54943 - IBM Tivoli Directory Server SASL Bind Request Buffer Overflow (uncredentialed check)
- 53625 - IBM Tivoli Directory Server Vulnerabilities (credentialed check)
- 80481 - IBM Tivoli Directory Server < 6.0.0.72 / 6.1.0.55 / 6.2.0.30 / 6.3.0.22 with GSKit < 7.0.4.45 / 8.0.14.27 TLS Side-Channel Timing Information Disclosure
- 80482 - IBM Security Directory Server < 6.1.0.61 / 6.2.0.36 / 6.3.0.30 / 6.3.1.2 with GSKit < 7.0.4.50 / 8.0.50.20 SSL CPU Utilization DoS
- 54924 - IBM Tivoli Management Framework Endpoint addr URL Remote Buffer Overflow
- 54987 - IBM Tivoli Management Framework Endpoint addr URL Default Credentials
- 58389 - IBM Tivoli Provisioning Manager Express for Software Distribution Isig.isigCtl.1 ActiveX RunAndUploadFile Method Boundary Error Remote Overflow
- 66270 - IBM Tivoli Endpoint Manager Server < 8.2.1372 Multiple Vulnerabilities
- 79335 - IBM Tivoli Endpoint Manager Server 9.1.x < 9.1.1117.0 OpenSSL Security Bypass
- 25005 - IBM Tivoli Provisioning Manager OS Deployment Multiple Unspecified Input Validation Vulnerabilities
- 25149 - IBM Tivoli Provisioning Manager OS Deployment Multiple Stack Overflows
- 26187 - IBM Tivoli Storage Manager Client Multiple Vulnerabilities (swg21268775)
- 42824 - IBM Tivoli Storage Manager Client Multiple Vulnerabilities (swg21405562)
- 25662 - IBM Tivoli Storage Manager Multiple Remote Overflows
- 77116 - IBM Tivoli Storage Manager Server 5.5.x Multiple Vulnerabilities
- 77117 - IBM Tivoli Storage Manager Server 6.1.x Multiple Vulnerabilities
- 77118 - IBM Tivoli Storage Manager Server 6.2.x < 6.2.6.0 Multiple Vulnerabilities
- 77120 - IBM Tivoli Storage Manager Server 6.3.x < 6.3.4.200 Information Disclosure
Version
This page has been produced using Nessus Professional 10.1.2 (#68) LINUX, Plugin set 202205072148.
Plugin file tivoli_access_manager_ebiz_6_1_1_10.nasl version 1.5. For more plugins, visit the Nessus Plugin Library.
Go back to menu.