First published: Thu Jan 17 2013(Updated: )
IBM Tivoli Federated Identity Manager (TFIM) before 6.1.1.14, 6.2.0 before 6.2.0.12, and 6.2.1 before 6.2.1.4 allows context-dependent attackers to discover (1) a cleartext LDAP Bind Password, (2) keystore passwords, (3) a cleartext Basic Authentication password from a client, or (4) a cleartext user password by leveraging a logging configuration with a log trace setting of all.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tivoli Federated Identity Manager | <=6.1.1.13 | |
IBM Tivoli Federated Identity Manager | =6.1.1 | |
IBM Tivoli Federated Identity Manager | =6.1.1.12 | |
IBM Tivoli Federated Identity Manager | =6.2.0 | |
IBM Tivoli Federated Identity Manager | =6.2.0.1 | |
IBM Tivoli Federated Identity Manager | =6.2.0.2 | |
IBM Tivoli Federated Identity Manager | =6.2.0.3 | |
IBM Tivoli Federated Identity Manager | =6.2.0.8 | |
IBM Tivoli Federated Identity Manager | =6.2.0.9 | |
IBM Tivoli Federated Identity Manager | =6.2.0.10 | |
IBM Tivoli Federated Identity Manager | =6.2.0.11 | |
IBM Tivoli Federated Identity Manager | =6.2.1 | |
IBM Tivoli Federated Identity Manager | =6.2.1.1 | |
IBM Tivoli Federated Identity Manager | =6.2.1.2 | |
IBM Tivoli Federated Identity Manager | =6.2.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.