Fix (APAR): PM45181 Status: Fix Release: 6.0.2.1,6.0.2.3,6.0.2.5,6.0.2.7,6.0.2.9,6.0.2.11,6.0.2.13,6.0.2.15,6.0.2.17,6.0.2.19,6.0.2.21,6.0.2.23,6.0.2.25,6.0.2.27,6.0.2.29,6.0.2.31,6.0.2.33,6.0.2.35,6.0.2.37,6.0.2.39,6.0.2.41,6.0.2.43,6.1,6.1.0.1,6.1.0.3,6.1.0.5,6.1.0.7,6.1.0.9,6.1.0.11,6.1.0.13,6.1.0.15,6.1.0.17,6.1.0.19,6.1.0.21,6.1.0.23,6.1.0.25,6.1.0.27,6.1.0.29,6.1.0.31,6.1.0.33,6.1.0.35,6.1.0.37,6.1.0.39,6.1.0.41,7.0,7.0.0.1,7.0.0.3,7.0.0.5,7.0.0.7,7.0.0.9,7.0.0.11,7.0.0.13,7.0.0.15,7.0.0.17,7.0.0.19,7.0.0.21,8.0.0.0,8.0.0.1,8.0.0.2 Operating System: AIX,HP-UX,IBM i,Linux,Solaris,Windows Supersedes Fixes: CMVC Defect: PM45181 Byte size of APAR: 14321 Date: 2012-05-02 Abstract: Possible security exposure with WebSphere Application Server with WS-Security enabled JAX-RPC applications using LTPA tokens Description/symptom of problem: PM45181 resolves the following problem: ERROR DESCRIPTION: An error in web services security (WS-Security) processing of an inbound LTPA token may cause a user to gain elevated privileges on the provider system. USERS AFFECTED: IBM WebSphere Application Server users of WS-Security enabled JAX-RPC applications and LTPA tokens PROBLEM DESCRIPTION: WebSphere Application Server could provide weaker than expected security when using web services security (WS-Security). A user could randomly gain elevated privileges on the provider system caused by an error in the LTPA token. RECOMMENDATION: Install a fix pack or ifix that contains this APAR. For WebSphere v6.1, apply 6.1.0.0-WS-WAS-IFPM45181.pak. For WebSphere v7, apply 7.0.0.0-WS-WAS-IFPM45181.pak. For WebSphere 8.0.0.0 through 8.0.0.1, apply 8.0.0.0-WS-WASProd-IFPM45181.zip. For WebSphere 8.0.0.2, apply 8.0.0.2-WS-WASProd-IFPM45181.zip. For WebSphere 6.0.2.1 through 6.0.2.43, apply 6.0.2.1-WS-WASBase-IFPM45181.pak For WebSphere 6.0.2.0, upgrade to fixpack 6.0.2.1 or later, then apply 6.0.2.1-WS-WASBase-IFPM45181.pak CONCLUSION: The fix for this APAR is currently targeted for inclusion in fix packs 6.1.0.43, 7.0.0.23, and 8.0.0.3. Please refer to the Recommended Updates page for delivery information: http://www.ibm.com/support/docview.wss?rs=180&uid=swg27004980 Directions to apply fix: Fix applies to Editions: Release 7.0 _x_ Application Server (Express or BASE) _x_ Network Deployment (ND) __ Edge Components __ Developer Install Fix to all WebSphere installations unless special instructions are included below. Special Instructions: None NOTE: The user must: * Logged in with the same authority level when unpacking a fix, fix pack or refresh pack. * Be at V7.0.0.0 or newer of the Update Installer. Certain iFixes may require a newer version of the Update Installer and the Update Installer will inform you during the installation process if a newer version is required. This can be checked by reviewing the level of the Update Installer in file /updateinstaller/version.txt. The Update Installer can be downloaded from the following link: http://www.ibm.com/support/docview.wss?rs=180&uid=swg21205991 1) If your iFix is delivered as a single file with a .pak extension, Copy the .pak file directly to the maintenance directory. If your iFix is delivered as a single file with a .zip extension, unzip the file into the maintenance directory. 2) Shutdown WebSphere Application Server. Manually execute setupCmdLine.bat in Windows or . ./setupCmdLine.sh in Unix from the WebSphere instance that maintenance is being applied to. 3) For IBM i users, use the update command to install and uninstall the interim fix. The IBM Information Center can provide additional details, if needed, on the use of this command. http://www14.software.ibm.com/webapp/wsbroker/redirect?version=compass&product=was-nd-iseries&topic=rins_update. For non-IBM i users, launch the Update Installer and click the Next button on the Welcome page. 4) Enter the directory path of the installation location of the WebSphere product you want to update, and click the Next button. 5) Select the "Install maintenance package" operation and click the Next button. 6) Enter the directory path of your maintenance directory where you have the maintenance packages (.pak files) and click the Next button. 7) The Available Maintenance Package to Install page should list all maintenance packages (.pak files) that it finds in the directory path provided in the previous step. The Update Installer will select the correct maintenance packages based on your system configuration and will not allow an invalid combination to be installed. Please keep the Update Installer recommendations and click the Next button and continue with the installation of the maintenance package. To determine why some maintenance packages have been identified as not applicable, see description in log found in /logs/tmp*/updatelogs.txt 8) For all platforms except Windows. In pre-install summary panel, use the "verify permission" feature to verify the user has permissions to apply updates to files associated with the selected maintenance. Correct any file permissions before clicking next to start the install. 9) Restart WebSphere Application Server. Directions to remove fix: NOTE: * The user must have Administrative rights in Windows, or be the Actual Root User in a UNIX environments. * FIXES MUST BE REMOVED IN THE ORDER THEY WERE APPLIED * DO NOT REMOVE A FIX UNLESS ALL FIXES APPLIED AFTER IT HAVE FIRST BEEN REMOVED * YOU MAY REAPPLY ANY REMOVED FIX Example: If your system has fix1, fix2, and fix3 applied in that order and fix2 is to be removed, fix3 must be removed first, fix2 removed, and fix3 re-applied. 1) Shutdown WebSphere Application Server. Manually execute setupCmdLine.bat in Windows or . ./setupCmdLine.sh in Unix from the WebSphere instance that uninstall is being run against. 2) Start Update Installer 3) Enter the installation location of the WebSphere product you want to remove the fix. 4) Select "Uninstall maintenance package" operation. 5) Enter the file name of the maintenance package to uninstall (PKxxxxx.pak). 6) UnInstall maintenance package. 7) Restart WebSphere Directions to re-apply fix: 1) Shutdown WebSphere Application Server. 2) Follow the Fix instructions to apply the fix. 3) Restart WebSphere Application Server. Additional Information: PM45181 applies to the JAX-RPC WS-Security runtime in WebSphere v6.0.2, v6.1, v7, and v8 PM43585 applies to the JAX-WS WS-Security runtime in WebSphere v7 and v8 PM43792 applies to the JAX-WS WS-Security runtime in the WebSphere Application Server Feature Pack for Web Services Version 6.1