First published: Wed Aug 08 2012(Updated: )
IBM Global Security Kit (aka GSKit) before 8.0.14.22, as used in IBM Rational Directory Server, IBM Tivoli Directory Server, and other products, uses the PKCS #12 file format for certificate objects without enforcing file integrity, which makes it easier for remote attackers to spoof SSL servers via vectors involving insertion of an arbitrary root Certification Authority (CA) certificate.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Global Security Kit | <=8.0.13 | |
IBM Global Security Kit | =7.0.4.28 | |
IBM Global Security Kit | =7.0.4.29 | |
IBM Tivoli Directory Server | ||
IBM Tivoli Directory Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2203 is classified as a medium severity vulnerability due to the potential for spoofing attacks.
To remediate CVE-2012-2203, update the IBM Global Security Kit to version 8.0.14.22 or higher.
CVE-2012-2203 affects IBM Global Security Kit versions before 8.0.14.22, as well as IBM Rational Directory Server and IBM Tivoli Directory Server.
Yes, CVE-2012-2203 can be exploited by remote attackers to spoof SSL servers.
There is no specific workaround for CVE-2012-2203; upgrading to the latest version is strongly recommended.