First published: Mon Oct 08 2012(Updated: )
servlet/traveler in IBM Lotus Notes Traveler through 8.5.3.3 Interim Fix 1 does not properly restrict invalid authentication attempts, which makes it easier for remote attackers to obtain access via a brute-force attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Notes Traveler | =8.5.0.0 | |
IBM Notes Traveler | =8.5.0.1 | |
IBM Notes Traveler | =8.5.0.2 | |
IBM Notes Traveler | =8.5.1.1 | |
IBM Notes Traveler | =8.5.1.2 | |
IBM Notes Traveler | =8.5.1.3 | |
IBM Notes Traveler | =8.5.2.1 | |
IBM Notes Traveler | =8.5.3 | |
IBM Notes Traveler | =8.5.3.1 | |
IBM Notes Traveler | =8.5.3.2 | |
IBM Notes Traveler | =8.5.3.3 | |
IBM Notes Traveler | =8.5.3.3-interim_fix_1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2012-5309 is considered to be medium, as it allows remote attackers to attempt a brute-force attack.
To fix CVE-2012-5309, it is recommended to upgrade IBM Lotus Notes Traveler to a version that includes security patches addressing this vulnerability.
CVE-2012-5309 affects IBM Lotus Notes Traveler versions from 8.5.0.0 to 8.5.3.3 Interim Fix 1.
Yes, CVE-2012-5309 can lead to unauthorized access as it makes it easier for attackers to exploit invalid authentication attempts.
Currently, there are no documented workarounds for CVE-2012-5309 other than applying the necessary updates.