IBM Tivoli Access Manager for e-Business < 6.0.0.33 / 6.1.0.14 / 6.1.1.10 SSL Multiple Vulnerabilities - Nessus

Low   Plugin ID: 80479

This page contains detailed information about the IBM Tivoli Access Manager for e-Business < 6.0.0.33 / 6.1.0.14 / 6.1.1.10 SSL Multiple Vulnerabilities Nessus plugin including available exploits and PoCs found on GitHub, in Metasploit or Exploit-DB for verifying of this vulnerability.

Plugin Overview


ID: 80479
Name: IBM Tivoli Access Manager for e-Business < 6.0.0.33 / 6.1.0.14 / 6.1.1.10 SSL Multiple Vulnerabilities
Filename: tivoli_access_manager_ebiz_6_1_1_10.nasl
Vulnerability Published: 2014-05-06
This Plugin Published: 2015-01-13
Last Modification Time: 2019-11-25
Plugin Version: 1.5
Plugin Type: local
Plugin Family: Misc.
Dependencies: tivoli_access_manager_ebiz_installed_components_cred.nasl
Required KB Items [?]: installed_sw/IBM Access Manager for e-Business / IBM Security Access Manager

Vulnerability Information


Severity: Low
Vulnerability Published: 2014-05-06
Patch Published: 2014-05-02
CVE [?]: CVE-2014-0076, CVE-2014-0963
CPE [?]: cpe:/a:ibm:tivoli_access_manager_for_e-business

Synopsis

An access and authorization control management system installed on the remote host is affected by multiple vulnerabilities.

Description

According to its self-reported version, the install of the IBM Tivoli Access Manager for e-Business is affected by multiple vulnerabilities :

- An error exists related to the implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA) that allows nonce disclosure via the 'FLUSH+RELOAD' cache side-channel attack. (CVE-2014-0076)

- A denial of service vulnerability exists that allows an attacker, using a specially crafted SSL request, to cause the host to become unresponsive. Note that this issue only affects the WebSEAL component and a workaround is available. (CVE-2014-0963)

Solution

Apply the interim fix 6.0.0-ISS-TAM-IF0033 / 6.1.0-ISS-TAM-IF0014 / 6.1.1-ISS-TAM-IF0010 or later.

Public Exploits


Target Network Port(s): N/A
Target Asset(s): N/A
Exploit Available: True (GitHub)
Exploit Ease: Exploits (PoCs) are available

Here's the list of publicly known exploits and PoCs for verifying the IBM Tivoli Access Manager for e-Business < 6.0.0.33 / 6.1.0.14 / 6.1.1.10 SSL Multiple Vulnerabilities vulnerability:

  1. GitHub: https://github.com/epsylon/orb
    [CVE-2014-0963]

Before running any exploit against any system, make sure you are authorized by the owner of the target system(s) to perform such activity. In any other case, this would be considered as an illegal activity.

WARNING: Beware of using unverified exploits from sources such as GitHub or Exploit-DB. These exploits and PoCs could contain malware. For more information, see how to use exploits safely.

Risk Information


CVSS Score Source [?]: CVE-2014-0076
CVSS V2 Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C
CVSS Base Score:1.9 (Low)
Impact Subscore:2.9
Exploitability Subscore:3.4
CVSS Temporal Score:1.4 (Low)
CVSS Environmental Score:NA (None)
Modified Impact Subscore:NA
Overall CVSS Score:1.4 (Low)

Go back to menu.

Plugin Source


This is the tivoli_access_manager_ebiz_6_1_1_10.nasl nessus plugin source code. This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(80479);
  script_version("1.5");
  script_cvs_date("Date: 2019/11/25");

  script_cve_id("CVE-2014-0076", "CVE-2014-0963");
  script_bugtraq_id(66363, 67238);

  script_name(english:"IBM Tivoli Access Manager for e-Business < 6.0.0.33 / 6.1.0.14 / 6.1.1.10 SSL Multiple Vulnerabilities");
  script_summary(english:"Checks the Runtime component version.");

  script_set_attribute(attribute:"synopsis", value:
"An access and authorization control management system installed on the
remote host is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version, the install of the IBM Tivoli
Access Manager for e-Business is affected by multiple vulnerabilities
:

  - An error exists related to the implementation of the
    Elliptic Curve Digital Signature Algorithm (ECDSA) that
    allows nonce disclosure via the 'FLUSH+RELOAD' cache
    side-channel attack. (CVE-2014-0076)

  - A denial of service vulnerability exists that allows an
    attacker, using a specially crafted SSL request, to
    cause the host to become unresponsive. Note that this
    issue only affects the WebSEAL component and a
    workaround is available. (CVE-2014-0963)");
  script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21672950");
  script_set_attribute(attribute:"see_also", value:"https://www-01.ibm.com/support/docview.wss?uid=swg21673008");
  script_set_attribute(attribute:"solution", value:
"Apply the interim fix 6.0.0-ISS-TAM-IF0033 / 6.1.0-ISS-TAM-IF0014 /
6.1.1-ISS-TAM-IF0010 or later.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-0076");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2014/05/06");
  script_set_attribute(attribute:"patch_publication_date", value:"2014/05/02");
  script_set_attribute(attribute:"plugin_publication_date", value:"2015/01/13");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:tivoli_access_manager_for_e-business");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("tivoli_access_manager_ebiz_installed_components_cred.nasl");
  script_require_keys("installed_sw/IBM Access Manager for e-Business / IBM Security Access Manager");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("install_func.inc");

app     = 'IBM Access Manager for e-Business / IBM Security Access Manager';
install = get_single_install(app_name:app, exit_if_unknown_ver:TRUE);

ver    = install['version'];
fix    = NULL;
no_fix = FALSE;

# Affected :
# 5.1.0.x (no longer supported)
# 6.0.0.x < 6.0.0.33
# 6.1.0.x < 6.1.0.14
# 6.1.1.x < 6.1.1.10
if (ver =~ "^5\.1\.0([^0-9]|$)")
{
  fix = "Refer to the advisory.";
  no_fix = TRUE;
}
else if (ver =~ "^6\.0\.0\.")
  fix = "6.0.0.33";
else if (ver =~ "^6\.1\.0\.")
  fix = "6.1.0.14";
else if (ver =~ "^6\.1\.1\.")
  fix = "6.1.1.10";
else
  audit(AUDIT_NOT_INST, app + " ver 5.1.0.x / 6.0.0.x / 6.1.0.x / 6.1.1.x");

if (no_fix || ver_compare(ver:ver, fix:fix, strict:FALSE) < 0)
{
  port = 0;

  if (report_verbosity > 0)
  {
    report =
      '\n' +
      '\n    Installed version : ' + ver +
      '\n    Fixed version     : ' + fix +
      '\n';
    security_note(port:port, extra:report);
  }
  else security_note(port);
}
else audit(AUDIT_INST_VER_NOT_VULN, app, ver);

The latest version of this script can be found in these locations depending on your platform:

  • Linux / Unix:
    /opt/nessus/lib/nessus/plugins/tivoli_access_manager_ebiz_6_1_1_10.nasl
  • Windows:
    C:\ProgramData\Tenable\Nessus\nessus\plugins\tivoli_access_manager_ebiz_6_1_1_10.nasl
  • Mac OS X:
    /Library/Nessus/run/lib/nessus/plugins/tivoli_access_manager_ebiz_6_1_1_10.nasl

Go back to menu.

How to Run


Here is how to run the IBM Tivoli Access Manager for e-Business < 6.0.0.33 / 6.1.0.14 / 6.1.1.10 SSL Multiple Vulnerabilities as a standalone plugin via the Nessus web user interface (https://localhost:8834/):

  1. Click to start a New Scan.
  2. Select Advanced Scan.
  3. Navigate to the Plugins tab.
  4. On the top right corner click to Disable All plugins.
  5. On the left side table select Misc. plugin family.
  6. On the right side table select IBM Tivoli Access Manager for e-Business < 6.0.0.33 / 6.1.0.14 / 6.1.1.10 SSL Multiple Vulnerabilities plugin ID 80479.
  7. Specify the target on the Settings tab and click to Save the scan.
  8. Run the scan.

Here are a few examples of how to run the plugin in the command line. Note that the examples below demonstrate the usage on the Linux / Unix platform.

Basic usage:

/opt/nessus/bin/nasl tivoli_access_manager_ebiz_6_1_1_10.nasl -t <IP/HOST>

Run the plugin with audit trail message on the console:

/opt/nessus/bin/nasl -a tivoli_access_manager_ebiz_6_1_1_10.nasl -t <IP/HOST>

Run the plugin with trace script execution written to the console (useful for debugging):

/opt/nessus/bin/nasl -T - tivoli_access_manager_ebiz_6_1_1_10.nasl -t <IP/HOST>

Run the plugin with using a state file for the target and updating it (useful for running multiple plugins on the target):

/opt/nessus/bin/nasl -K /tmp/state tivoli_access_manager_ebiz_6_1_1_10.nasl -t <IP/HOST>

Go back to menu.

References


BID | SecurityFocus Bugtraq ID: See also: Similar and related Nessus plugins:
  • 54943 - IBM Tivoli Directory Server SASL Bind Request Buffer Overflow (uncredentialed check)
  • 53625 - IBM Tivoli Directory Server Vulnerabilities (credentialed check)
  • 80481 - IBM Tivoli Directory Server < 6.0.0.72 / 6.1.0.55 / 6.2.0.30 / 6.3.0.22 with GSKit < 7.0.4.45 / 8.0.14.27 TLS Side-Channel Timing Information Disclosure
  • 80482 - IBM Security Directory Server < 6.1.0.61 / 6.2.0.36 / 6.3.0.30 / 6.3.1.2 with GSKit < 7.0.4.50 / 8.0.50.20 SSL CPU Utilization DoS
  • 54924 - IBM Tivoli Management Framework Endpoint addr URL Remote Buffer Overflow
  • 54987 - IBM Tivoli Management Framework Endpoint addr URL Default Credentials
  • 58389 - IBM Tivoli Provisioning Manager Express for Software Distribution Isig.isigCtl.1 ActiveX RunAndUploadFile Method Boundary Error Remote Overflow
  • 66270 - IBM Tivoli Endpoint Manager Server < 8.2.1372 Multiple Vulnerabilities
  • 79335 - IBM Tivoli Endpoint Manager Server 9.1.x < 9.1.1117.0 OpenSSL Security Bypass
  • 25005 - IBM Tivoli Provisioning Manager OS Deployment Multiple Unspecified Input Validation Vulnerabilities
  • 25149 - IBM Tivoli Provisioning Manager OS Deployment Multiple Stack Overflows
  • 26187 - IBM Tivoli Storage Manager Client Multiple Vulnerabilities (swg21268775)
  • 42824 - IBM Tivoli Storage Manager Client Multiple Vulnerabilities (swg21405562)
  • 25662 - IBM Tivoli Storage Manager Multiple Remote Overflows
  • 77116 - IBM Tivoli Storage Manager Server 5.5.x Multiple Vulnerabilities
  • 77117 - IBM Tivoli Storage Manager Server 6.1.x Multiple Vulnerabilities
  • 77118 - IBM Tivoli Storage Manager Server 6.2.x < 6.2.6.0 Multiple Vulnerabilities
  • 77120 - IBM Tivoli Storage Manager Server 6.3.x < 6.3.4.200 Information Disclosure

Version


This page has been produced using Nessus Professional 10.1.2 (#68) LINUX, Plugin set 202205072148.
Plugin file tivoli_access_manager_ebiz_6_1_1_10.nasl version 1.5. For more plugins, visit the Nessus Plugin Library.

Go back to menu.