First published: Sun Apr 22 2012(Updated: )
The default configuration of TLS in IBM Tivoli Directory Server (TDS) 6.3 and earlier supports the (1) NULL-MD5 and (2) NULL-SHA ciphers, which allows remote attackers to trigger unencrypted communication via the TLS Handshake Protocol.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tivoli Directory Server | <=6.3.0 | |
IBM Tivoli Directory Server | =3.2.2 | |
IBM Tivoli Directory Server | =4.1 | |
IBM Tivoli Directory Server | =5.2.0 | |
IBM Tivoli Directory Server | =6.0 | |
IBM Tivoli Directory Server | =6.0.0 | |
IBM Tivoli Directory Server | =6.0.0.7 | |
IBM Tivoli Directory Server | =6.0.0.8 | |
IBM Tivoli Directory Server | =6.0.0.69 | |
IBM Tivoli Directory Server | =6.1.0 | |
IBM Tivoli Directory Server | =6.1.0.45 | |
IBM Tivoli Directory Server | =6.1.0.46 | |
IBM Tivoli Directory Server | =6.1.0.47 | |
IBM Tivoli Directory Server | =6.1.0.48 | |
IBM Tivoli Directory Server | =6.2.0 | |
IBM Tivoli Directory Server | =6.2.0.19 | |
IBM Tivoli Directory Server | =6.2.0.20 | |
IBM Tivoli Directory Server | =6.2.0.21 | |
IBM Tivoli Directory Server | =6.2.0.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0726 has a moderate severity rating due to its potential for enabling unencrypted communications.
To mitigate CVE-2012-0726, configure IBM Tivoli Directory Server to disable the NULL-MD5 and NULL-SHA cipher suites.
CVE-2012-0726 affects multiple versions of IBM Tivoli Directory Server including versions from 3.2.2 to 6.3.0.
The risks associated with CVE-2012-0726 include unauthorized access to sensitive information due to unencrypted TLS communications.
IBM has released guidance on securing the affected versions, but specific patches may vary based on the installed version of Tivoli Directory Server.