First published: Fri May 10 2013(Updated: )
IBM Sterling Secure Proxy 3.2.0 and 3.3.01 before 3.3.01.23 Interim Fix 1, 3.4.0 before 3.4.0.6 Interim Fix 1, and 3.4.1 before 3.4.1.7 allows remote authenticated users to obtain sensitive Java stack-trace information by providing invalid input data.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Secure Proxy | =3.2.0.0 | |
IBM Sterling Secure Proxy | =3.3.0.1 | |
IBM Sterling Secure Proxy | =3.4.0.0 | |
IBM Sterling Secure Proxy | =3.4.1.0 | |
IBM Sterling Secure Proxy | =3.4.1.2 | |
IBM Sterling Secure Proxy | =3.4.1.5 | |
IBM Sterling Secure Proxy | =3.4.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0520 has a medium severity rating due to exposure of sensitive information.
To fix CVE-2013-0520, update to the latest versions: 3.3.01.23 Interim Fix 1, 3.4.0.6 Interim Fix 1, or 3.4.1.7.
CVE-2013-0520 affects users of IBM Sterling Secure Proxy versions 3.2.0 to 3.4.1.6.
CVE-2013-0520 can expose sensitive Java stack-trace information.
Yes, remote authenticated users can exploit CVE-2013-0520 to obtain sensitive information.