First published: Fri Aug 12 2011(Updated: )
The LTPA STS module support implementation in IBM Tivoli Federated Identity Manager (TFIM) 6.2.0 before 6.2.0.9 and Tivoli Federated Identity Manager Business Gateway (TFIMBG) 6.2.0 before 6.2.0.9 relies on a static instance of a Java Development Kit (JDK) class, which might allow attackers to bypass LTPA token signature verification by leveraging lack of thread safety.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tivoli Federated Identity Manager | =6.2.0.2 | |
IBM Tivoli Federated Identity Manager | =6.2.0 | |
IBM Tivoli Federated Identity Manager | =6.2.0.1 | |
IBM Tivoli Federated Identity Manager | =6.2.0.3 | |
IBM Tivoli Federated Identity Manager | =6.2.0.8 | |
Ibm Tivoli Federated Identity Manager Business Gateway | =6.2.0 | |
Ibm Tivoli Federated Identity Manager Business Gateway | =6.2.0.1 | |
Ibm Tivoli Federated Identity Manager Business Gateway | =6.2.0.3 | |
Ibm Tivoli Federated Identity Manager Business Gateway | =6.2.0.8 | |
Ibm Tivoli Federated Identity Manager Business Gateway | =6.2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.