-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2012.1147
    Security Bulletin: Potential security vulnerabilities in WebSphere
        Application Server products for the Oracle October 2012 CPU
                              5 December 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           WebSphere Application Server
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   Linux variants
                   Solaris
                   Windows
                   IBM i
                   i5/OS
                   z/OS
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Access Privileged Data          -- Remote/Unauthenticated
                   Modify Arbitrary Files          -- Remote/Unauthenticated
                   Delete Arbitrary Files          -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2012-5089 CVE-2012-5088 CVE-2012-5087
                   CVE-2012-5086 CVE-2012-5085 CVE-2012-5084
                   CVE-2012-5083 CVE-2012-5082 CVE-2012-5081
                   CVE-2012-5080 CVE-2012-5079 CVE-2012-5078
                   CVE-2012-5077 CVE-2012-5076 CVE-2012-5075
                   CVE-2012-5074 CVE-2012-5073 CVE-2012-5072
                   CVE-2012-5071 CVE-2012-5070 CVE-2012-5069
                   CVE-2012-5068 CVE-2012-5067 CVE-2012-4416
                   CVE-2012-3216 CVE-2012-3159 CVE-2012-3143
                   CVE-2012-1533 CVE-2012-1532 CVE-2012-1531

Reference:         ASB-2012.0144
                   ASB-2012.0143
                   ESB-2012.1090
                   ESB-2012.1004
                   ESB-2012.1003
                   ESB-2012.0999
                   ESB-2012.0998

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21617227

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Potential security vulnerabilities in WebSphere Application
Server products for the Oracle October 2012 CPU

Flash (Alert)

Document information
WebSphere Application Server

General
Software version:
6.1, 7.0, 8.0, 8.5

Operating system(s):
AIX, HP-UX, IBM i, Linux, Solaris, Windows, i5/OS, z/OS

Software edition:
Base, Developer, Express, Network Deployment

Reference #:
1617227

Modified date:
2012-12-04

Abstract

The IBM WebSphere Application Server is shipped with an IBM Java JDK that is 
based on the Oracle JDK. Oracle has released October 2012 critical patch 
updates (CPU) which contain security vulnerability fixes and the IBM Java JDK
that WebSphere Application Server ships is affected. 

Content

Versions affected:

   * JDK shipped with IBM WebSphere Application Server Version 8.5.0.0 through
   8.5.0.1, Version 8.0.0.0 through 8.0.0.5, Version 7.0.0.0 through 7.0.0.25, 
   Version 6.1.0.0 through 6.1.0.45 
   * This does not occur on JDK versions shipped with WebSphere Application 
   Servers 8.5.0.2, 8.0.0.6, 7.0.0.27 and 6.1.0.47 or later.

Description: 
This Security Bulletin addresses the security vulnerabilities 
that have shipped with the IBM JDK and is part of the Oracle October 2012 
critical patch updates (CPU). For details on these updates please refer to the
Reference section of this bulletin.

Solutions: 
Upgrade your JDK to an interim fix level as determined below:

For IBM WebSphere Application Server for distributed operating systems and IBM
WebSphere Application Server Hypervisor Edition :

Download and apply the interim fix APARs below, for your appropriate release:

For V8.5.0.0 through 8.5.0.1:

    Apply Interim Fix PM75382: Will upgrade you to JDK 6 2.6 SR4

- --OR--

    Apply Interim Fix PM75383: Will upgrade you to JDK 7 SR3

- --OR--

    Apply Java SDK shipped with WebSphere Application Server Fix pack 2 
    (8.5.0.2) or later (targeted to be available mid April 2013).

For 8.0.0.0 through 8.0.0.5:

    Apply Interim Fix PM75381: Will upgrade you to JDK 6 2.6 SR4

- --OR--

    Apply Java SDK shipped with WebSphere Application Server Fix pack 6 
    (8.0.0.6) or later (targeted to be available late April 2013).

For V7.0.0.0 through 7.0.0.25:

    Apply Interim Fix PM75379: Will upgrade you to JDK 6 SR12

- --OR--

    Apply Java SDK shipped with WebSphere Application Server Fix pack 27 
    (7.0.0.27) or later (targeted to be available late January 2013).

For V6.1.0.0 through 6.1.0.45:

    Apply Interim Fix PM75378: Will upgrade you to JDK 5 SR15

- --OR--

    Apply Java SDK shipped with WebSphere Application Server Fix pack 47 
    (6.1.0.47) or later (check back for estimated date).

For IBM WebSphere Application Server for i5/OS operating systems:

The IBM Developer Kit for Java is prerequisite software for WebSphere 
Application Server for IBM i.

For Versions 8.5.0.0 through 8.5.0.1:

    Apply all of the PTFs matching one of these Developer Kit for Java options
    and the version of IBM i installed on your system from the chart below.

For Versions 8.0.0.0 through 8.0.0.5:

    Apply all of the PTFs matching one of these Developer Kit for Java options
    and the version of IBM i installed on your system from the chart below.

For Versions 7.0 through 7.0.0.25:

    Apply all of the PTFs matching one of these Developer Kit for Java options
    and the version of IBM i installed on your system from the chart below.

For Versions 6.1 through 6.1.0.45:

    Apply all of the PTFs matching one of these Developer Kit for Java options
    and the version of IBM i installed on your system from the chart below.

		Java Developer Kit 5.0 32 bit 	Java Developer Kit 5.0 64 bit 	Java Developer Kit 6.0 32 bit 	Java Developer Kit 6.0 64 bit 	Java Developer Kit 6.2.6 32 bit 	Java Developer Kit 6.2.6 64 bit 	Java Developer Kit 7.0 32 bit 	Java Developer Kit 7.0 64 bit
V5R4		SI48515				N/A				SI48554				N/A				N/A					N/A					N/A				N/A
		SI48514								SI48559

IBM i 6.1	SI48512				SI48513				SI48541				SI48543				TBD*					TBD*					N/A				N/A			
		SI48516				SI48518				SI48558				SI48605
														SI48621

IBM i 7.1	SI48512				SI48513				SI48541				SI48543				TBD*					TBD*					TBD*				TBD*	
		SI48516				SI48518				SI48558				SI48605
														SI48621
		
TBD - to be determined. The table will be updated with the PTFs as soon as 
they become available.

For WebSphere Application Server for z/OS operating systems:

For V8.5.0.0 through 8.5.0.1:

    Apply Interim Fix PM75382: Will upgrade you to JDK 6 2.6 SR4

- --OR--

    Apply Interim Fix PM75383: Will upgrade you to JDK 7 SR3

- --OR--

    Apply Java SDK shipped with WebSphere Application Server Fix pack 2 
   (8.5.0.2) or later (targeted to be available mid April 2013).

For V8.0.0.0 through 8.0.0.5:

    Apply Interim Fix PM75381: Will upgrade you to JDK 6 2.6 SR4

- --OR--

    Apply Java SDK shipped with WebSphere Application Server Fix Pack 6 
   (8.0.0.6) or later (targeted to be available late April 2013).

For V7.0.0.0 through 7.0.0.25:

    Open a Problem Management Record (PMR) with IBM WebSphere Application 
    Server support to request ++APARs for PM75379 Please include, in the PMR, 
    your WebSphere Application Server Fix Pack level, as well as any 
    additional ++APARs and Feature Packs that you have installed

- -OR-

    Apply Java SDK shipped with WebSphere Application Server Fix Pack 
    7.0.0.27, or later, at APAR/PTF Tables by version for IBM WebSphere 
    Application Server for z/OS (targeted to be available late January 2013)

For V6.1.0.0 through 6.1.0.45:

    Open a Problem Management Record (PMR) with IBM WebSphere Application 
    Server support to request a ++APAR for PM75378 Please include, in the PMR, 
    your WebSphere Application Server Fix Pack level, as well as any 
    additional ++APARs and Feature Packs that you have installed.

- --OR--

    Apply Java SDK shipped with WebSphere Application Server Fix Pack 
    6.1.0.47, or later, at APAR/PTF Tables by version for IBM WebSphere 
    Application Server for z/OS. (check back for estimated date)

For additional details and information on WebSphere Application Server product
updates:

    For Distributed, see Recommended fixes for WebSphere Application Server. 
    For i5/OS, see WebSphere Application Server for i5/OS. For z/OS, see 
    APAR/PTF Tables by version for IBM WebSphere Application Server for z/OS.

Change history

    04 Dec 2012: Original publish date

REFERENCES:

    IBM Security Alerts: Oracle October 2012 Security Alert. Oracle Java SE 
    Critical Patch Update Advisory - June 2012: Oracle Java SE Critical Patch 
    Update Advisory - October 2012. Java on IBM i Complete CVSS Guide 
    http://www.first.org/cvss/cvss-guide.html On-line Calculator V2 
    http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2

*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the 
Reference section of this Flash.

Note: According to the Forum of Incident Response and Security Teams (FIRST),
the Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=AXjU
-----END PGP SIGNATURE-----