CVE-2016-6025
06.10.2016, 10:59
The Configuration Manager in IBM Sterling Secure Proxy (SSP) 3.4.2 before 3.4.2.0 iFix 8 and 3.4.3 before 3.4.3.0 iFix 1 allows remote attackers to obtain access by leveraging an unattended workstation to conduct a post-logoff session-reuse attack involving a modified URL.Enginsight
Vendor | Product | Version |
---|---|---|
ibm | sterling_secure_proxy | 3.4.2.0 |
ibm | sterling_secure_proxy | 3.4.2.0:ifix1 |
ibm | sterling_secure_proxy | 3.4.2.0:ifix2 |
ibm | sterling_secure_proxy | 3.4.2.0:ifix3 |
ibm | sterling_secure_proxy | 3.4.2.0:ifix4 |
ibm | sterling_secure_proxy | 3.4.2.0:ifix5 |
ibm | sterling_secure_proxy | 3.4.2.0:ifix6 |
ibm | sterling_secure_proxy | 3.4.2.0:ifix7 |
ibm | sterling_secure_proxy | 3.4.3.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration