Vulnerability Name:

CCN-11225

Published:2001-05-09
Updated:2001-05-09
Summary:BEA Tuxedo could allow a remote attacker to gain unauthorized access to a service in a remote Tuxedo domain (TDomain), caused by a vulnerability in the TDomain gateway. If SECURITY is set to APP_PW or DM_PW in TDomain gateway's dmconfig file, a remote attacker could spoof the TDomain gateway protocol and submit a request to bypass authentication and gain unauthorized access to a remote TDomain service.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Consequences:Bypass Security
References:Source: XF
Type: UNKNOWN
tuxedo-tdomain-auth-bypass(11225)

Source: CCN
Type: BEA Systems, Inc. Security Advisory (BEA01-10.00)
Patch Available for TDomain gateway Vulnerability in BEA Tuxedo

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:bea:tuxedo:6.3:*:*:*:*:*:*:*
  • OR cpe:/a:bea:tuxedo:6.4:*:*:*:*:*:*:*
  • OR cpe:/a:bea:tuxedo:6.5:*:*:*:*:*:*:*
  • AND
  • cpe:/o:sun:sunos:5.6:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.00:*:*:*:*:*:*:*
  • OR cpe:/a:bea:tuxedo:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:4.3.3:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.7:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    bea tuxedo 6.3
    bea tuxedo 6.4
    bea tuxedo 6.5
    sun solaris 2.6
    hp hp-ux 11.00
    bea tuxedo 7.1
    ibm aix 4.3.3
    sun solaris 2.7