CVE Vulnerabilities

CVE-2016-6025

Published: Oct 06, 2016 | Modified: Nov 28, 2016
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CVSS 2.x
4.6 MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

The Configuration Manager in IBM Sterling Secure Proxy (SSP) 3.4.2 before 3.4.2.0 iFix 8 and 3.4.3 before 3.4.3.0 iFix 1 allows remote attackers to obtain access by leveraging an unattended workstation to conduct a post-logoff session-reuse attack involving a modified URL.

Affected Software

Name Vendor Start Version End Version
Sterling_secure_proxy Ibm 3.4.2.0 (including) 3.4.2.0 (including)
Sterling_secure_proxy Ibm 3.4.2.0-ifix1 (including) 3.4.2.0-ifix1 (including)
Sterling_secure_proxy Ibm 3.4.2.0-ifix2 (including) 3.4.2.0-ifix2 (including)
Sterling_secure_proxy Ibm 3.4.2.0-ifix3 (including) 3.4.2.0-ifix3 (including)
Sterling_secure_proxy Ibm 3.4.2.0-ifix4 (including) 3.4.2.0-ifix4 (including)
Sterling_secure_proxy Ibm 3.4.2.0-ifix5 (including) 3.4.2.0-ifix5 (including)
Sterling_secure_proxy Ibm 3.4.2.0-ifix6 (including) 3.4.2.0-ifix6 (including)
Sterling_secure_proxy Ibm 3.4.2.0-ifix7 (including) 3.4.2.0-ifix7 (including)
Sterling_secure_proxy Ibm 3.4.3.0 (including) 3.4.3.0 (including)

References