The Configuration Manager in IBM Sterling Secure Proxy (SSP) 3.4.2 before 3.4.2.0 iFix 8 and 3.4.3 before 3.4.3.0 iFix 1 allows remote attackers to obtain access by leveraging an unattended workstation to conduct a post-logoff session-reuse attack involving a modified URL.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Sterling_secure_proxy | Ibm | 3.4.2.0 (including) | 3.4.2.0 (including) |
Sterling_secure_proxy | Ibm | 3.4.2.0-ifix1 (including) | 3.4.2.0-ifix1 (including) |
Sterling_secure_proxy | Ibm | 3.4.2.0-ifix2 (including) | 3.4.2.0-ifix2 (including) |
Sterling_secure_proxy | Ibm | 3.4.2.0-ifix3 (including) | 3.4.2.0-ifix3 (including) |
Sterling_secure_proxy | Ibm | 3.4.2.0-ifix4 (including) | 3.4.2.0-ifix4 (including) |
Sterling_secure_proxy | Ibm | 3.4.2.0-ifix5 (including) | 3.4.2.0-ifix5 (including) |
Sterling_secure_proxy | Ibm | 3.4.2.0-ifix6 (including) | 3.4.2.0-ifix6 (including) |
Sterling_secure_proxy | Ibm | 3.4.2.0-ifix7 (including) | 3.4.2.0-ifix7 (including) |
Sterling_secure_proxy | Ibm | 3.4.3.0 (including) | 3.4.3.0 (including) |