---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: IBM WebSphere Application Server Unspecified Vulnerability SECUNIA ADVISORY ID: SA31149 VERIFY ADVISORY: http://secunia.com/advisories/31149/ CRITICAL: Moderately critical IMPACT: Unknown WHERE: >From remote SOFTWARE: IBM WebSphere Application Server 5.x http://secunia.com/product/2614/ DESCRIPTION: A vulnerability with an unknown impact has been reported in IBM WebSphere Application Server. The vulnerability is caused due to an unspecified error within the "PropFilePasswordEncoder" utility. No further information is currently available. NOTE: An issue in "Wsadmin", which may leave some previously encrypted properties unencrypted has also been reported. SOLUTION: Apply Fix Pack 19 (5.1.1.19). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: IBM (PK61436): http://www-1.ibm.com/support/docview.wss?uid=swg27006879 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------