{"vuid":"VU#659791","idnumber":"659791","name":"IBM ISS Proventia Mail Security contains multiple vulnerabilities","keywords":["IBM","ISS","Proventia","Mail","xss","file","read","arbitrary"],"overview":"IBM ISS Proventia Mail Security contains cross-site scripting and arbitrary file read vulnerabilities.","clean_desc":"The IBM security advisories state: CVE-2012-2955\n\"The administrative user interface contains pages where it is possible to inject arbitrary JavaScript code contained in an HTTP request query string (Reflected XSS). If the HTTP request is executed in the web interface after a user has authenticated, the attacker could access cookies, files, or session information. To be successful, this requires the attacker to have specific information about the installed product.\" CVE-2012-2202\n\"An Arbitrary File Read is possible on the javatester_init.php page by passing an unvalidated parameter after authentication has occurred. It enables an administrative user to access file content otherwise inaccessible through the administrative web interface.\" Additional details may be found in the full advisories linked above.","impact":"An attacker may be able to read arbitrary files or launch an XSS attack to steal cookies, execute scripts in the user's browser, etc.","resolution":"Apply an Update The IBM security advisory recommends the following. Lotus Protector for Mail Security 2.8.x and later - If automatic System Package Updates are enabled, no further action is necessary. The system will download and install the update automatically. - For manual System Package Updates: - Log in to the Management Console - Go to \"Updates\" -> \"Updates & Licensing\" - Install all pending System Package Updates Lotus Protector for Mail Security 2.5.x - Follow the instructions on http://www-01.ibm.com/support/docview.wss?uid=swg21605199 to download and install the fix. Lotus Protector for Mail Security 2.1.x - Upgrade to version 2.5.x or 2.8.x and follow the remediation steps listed above IBM Proventia Network Mail Security System 2.5.x and later - Follow the instructions on http://www-01.ibm.com/support/docview.wss?uid=swg21605199 to download and install the fix. IBM Proventia Network Mail Security System 2.4.x and earlier - Upgrade to version 2.5.x or later and follow the remediation steps listed above","workarounds":"","sysaffected":"","thanks":"Thanks to Offensive Security for reporting these vulnerabilities.","author":"This document was written by Jared Allar.","public":["http://www-01.ibm.com/support/docview.wss?uid=swg21605626","http://www-01.ibm.com/support/docview.wss?uid=swg21605630"],"cveids":["CVE-2012-2955","CVE-2012-2202"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2012-06-08T16:43:14Z","publicdate":"2012-07-20T00:00:00Z","datefirstpublished":"2012-07-25T17:33:00Z","dateupdated":"2012-07-25T17:33:00Z","revision":17,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"N","cvss_integrityimpact":"P","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"ND","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"4.3","cvss_basevector":"AV:N/AC:M/Au:N/C:N/I:P/A:N","cvss_temporalscore":"3.6","cvss_environmentalscore":"3.6","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}