First published: Mon Dec 18 2006(Updated: )
The Java Key Store (JKS) for WebSphere Application Server (WAS) for IBM Tivoli Identity Manager (ITIM) 4.6 places the JKS password in a -Djavax.net.ssl.trustStorePassword command line argument, which allows local users to obtain the password by listing the process or using other methods.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tivoli Identity Manager | =4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6607 is classified as a medium severity vulnerability due to the exposure of sensitive password information.
To fix CVE-2006-6607, avoid passing the JKS password as a command line argument and consider using more secure methods for managing sensitive passwords.
CVE-2006-6607 impacts the IBM Tivoli Identity Manager version 4.6.
Yes, local users can exploit CVE-2006-6607 by listing running processes to reveal the command line arguments containing the JKS password.
CVE-2006-6607 remains relevant as it highlights fundamental security practices related to handling sensitive information, which are still applicable.