First published: Tue Oct 02 2012(Updated: )
IBM Tivoli Federated Identity Manager (TFIM) and Tivoli Federated Identity Manager Business Gateway (TFIMBG) 6.1.1, 6.2.0, 6.2.1, and 6.2.2 allow remote attackers to establish sessions via a crafted message that leverages (1) a signature-validation bypass for SAML messages containing unsigned elements, (2) incorrect validation of XML messages, or (3) a certificate-chain validation bypass for an XML signature element that contains the signing certificate.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tivoli Federated Identity Manager | =6.1.1 | |
IBM Tivoli Federated Identity Manager | =6.2.0 | |
IBM Tivoli Federated Identity Manager | =6.2.1 | |
IBM Tivoli Federated Identity Manager | =6.2.2 | |
Ibm Tivoli Federated Identity Manager Business Gateway | =6.1.1 | |
Ibm Tivoli Federated Identity Manager Business Gateway | =6.2.0 | |
Ibm Tivoli Federated Identity Manager Business Gateway | =6.2.1 | |
Ibm Tivoli Federated Identity Manager Business Gateway | =6.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.