-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2012.1128
IBM WebSphere Message Broker Security Vulnerability: potential for product
          files to be owned by a non-trusted user (CVE-2012-3317)
                              3 December 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM WebSphere Message Broker
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   Linux variants
                   SUSE
                   Solaris
Impact/Access:     Root Compromise        -- Existing Account
                   Modify Arbitrary Files -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2012-3317  

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21611401

- --------------------------BEGIN INCLUDED TEXT--------------------

IBM WebSphere Message Broker Security Vulnerability: potential for product 
files to be owned by a non-trusted user (CVE-2012-3317)

Flash (Alert)

Document information

WebSphere Message Broker

Installation

Software version:
6.1, 7.0, 7.0.0.1, 7.0.0.2, 7.0.0.3, 7.0.0.4, 8.0, 8.0.0.1

Operating system(s):
AIX, HP-UX, HP-UX on Itanium, HP-UX on PA-RISC, Linux, Linux SUSE - pSeries, 
Linux SUSE - xSeries, Linux SUSE - zSeries, Linux SUSE -zSeries, Linux pSeries, 
Solaris

Reference #:
1611401

Modified date:
2012-11-29

Abstract

User/Group security vulnerability in uninstaller JRE for IBM WebSphere Message
Broker, MBX and SupportPacs IE02 and IS02 Content

VULNERABILITY DETAILS

CVE ID: CVE-2012-3317

DESCRIPTION: 
When the WebSphere Message Broker, MBX, IE02 and IS02 uninstaller
IBM Java Runtime Environment (JRE) files are created, they are not owned by 
the same user and group as the other product files. This ownership may not 
resolve to a trusted user on every system, and gives that user the ability to
change program files which will later be run by the root user. The JRE files 
should be owned by the same user as other installed WebSphere Message Broker,
MBX, IE02 and IS02 files.

CVSS: 
CVSS base score: 6.9 
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/77818 for the 
  current score 
CVSS Environmental Score*: Undefined 
CVSS Vector: (AV:L/AC:M/Au:N/C:C/I:C/A:C)

*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the 
Reference section of this Flash.

AFFECTED PLATFORMS: 
IBM WebSphere Message Broker V8, V7 and V6.1 are affected on all UNIX 
platforms

REMEDIATION: 
The recommended solution is to apply the Fix Pack mentioned below
as soon as it is available. Prior to availability it is recommended that you 
follow the workaround instructions below.

FIX 
IBM WebSphere Message Broker APAR IC85477 which is targeted for 8.0.0.2, 
7.0.0.5 and 6.1.0.11- see IBM WebSphere Message Broker planned maintenance 
release dates for target availability: 
http://www-01.ibm.com/support/docview.wss?uid=swg27006308

WORKAROUND: 
Logon to the system as root, change the userid and group for the 
uninstaller jre files to the same user and group as the rest of the WebSphere
Message Broker, MBX and SupportPacs IE02 & IS02 product files.

MITIGATION 
None known

REFERENCES: 
Complete CVSS Guide (http://www.first.org/cvss/cvss-guide.html) 
On-line Calculator V2 (http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2)

X-Force Vulnerability Database (http://xforce.iss.net/xforce/xfdb/77818) 
CVE-2012-3317 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3317)

CHANGE HISTORY: 
<xx/xx/xxxx>: Original Copy Published

Note: According to the Forum of Incident Response and Security Teams (FIRST),
the Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Related information

IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog

Product Alias/Synonym

WMB MB

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBULwmme4yVqjM2NGpAQIrnQ/9HH91rJUAr40gjgOYtWI0L/01B6TITUMg
00ZnyDN3OVnWiIvDHjJgxnQPnY1wp36Rjvp/U66ICVt2dEiTh+DITZr2cQeImQDl
m4hrlopWlJKDPX78DibV/Ln89SLtbdWHec7/mzf0LdyfynyAK/d48doriaYV32Lf
TA7LDZIIvm/aEU3Hrsnn3dOU2NCYVimGPACLaW0V1iyeaD/3I0AzGhmk7vlFNcPj
3IRYQXHRckW9neEHvCu3dsBHZs8N0T1yDv2fzfY+HSiplA7tGkYqtkMzzz9dFJwu
tTFa2m6D4Lkbh2eNjxmbmw7rNHkxVb+WH2GZqT707KVKYEYvSkuLF1oVzz1slcUl
LG/DhrAtO8cn6z6ysqunr8yGDmwSDLGC8S2111ON8cnRaieuOA/2OYlqLnnu2liM
c7d1AJiGYY1KV8XtBsZRbj+WHYdR39YkQl4Qqo+lWtYkiD4m99YO7BFpbMDDo9vr
0n5+gndwlB4qgVD1In7XnjA1orNJ8lpKrJ5wA3QlaRz9CyJ5CB1e6Bas2W11uRzI
xtj+7RBh+08ObeIhLrGVPk+BtNHZXmx40i/yyORbIFiQtGrZf2sD27B8PM9q+j6m
y/1h9N/3+HayOm54R9eznllbgncLRPqR7755D+A/ckc0R1EsyJ92cKlD1/l3yyTn
UOXa66ExkJ0=
=ReL2
-----END PGP SIGNATURE-----