First published: Fri May 10 2013(Updated: )
IBM Sterling Secure Proxy 3.2.0 and 3.3.01 before 3.3.01.23 Interim Fix 1, 3.4.0 before 3.4.0.6 Interim Fix 1, and 3.4.1 before 3.4.1.7 provides web-server version data in (1) an unspecified page title and (2) an unspecified HTTP header field, which allows remote attackers to obtain potentially sensitive information by reading a version string.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Secure Proxy | =3.2.0.0 | |
IBM Sterling Secure Proxy | =3.3.0.1 | |
IBM Sterling Secure Proxy | =3.4.0.0 | |
IBM Sterling Secure Proxy | =3.4.1.0 | |
IBM Sterling Secure Proxy | =3.4.1.2 | |
IBM Sterling Secure Proxy | =3.4.1.5 | |
IBM Sterling Secure Proxy | =3.4.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0519 has a medium severity rating as it allows remote attackers to obtain potentially sensitive information.
To fix CVE-2013-0519, users should upgrade to IBM Sterling Secure Proxy version 3.3.01.23 or higher, 3.4.0.6 or higher, or 3.4.1.7 or higher.
IBM Sterling Secure Proxy versions 3.2.0.0, 3.3.0.1, 3.4.0.0, 3.4.1.0, 3.4.1.2, 3.4.1.5, and 3.4.1.6 are affected by CVE-2013-0519.
CVE-2013-0519 can expose web-server version data through an unspecified page title and HTTP header field.
There is no official workaround for CVE-2013-0519; upgrading to the fixed versions is the recommended approach.