-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.0770
   Security Bulletin: IBM Tivoli Directory Integrator can be affected by
            vulnerabilities in the IBM Java Runtime Environment
               (CVE-2013-0440, CVE-2013-0443, CVE-2013-0169)
                                3 June 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Tivoli Directory Integrator
Publisher:         IBM
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Modify Arbitrary Files   -- Remote/Unauthenticated
                   Delete Arbitrary Files   -- Remote/Unauthenticated
                   Denial of Service        -- Remote/Unauthenticated
                   Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-0443 CVE-2013-0440 CVE-2013-0169

Reference:         ASB-2013.0069
                   ESB-2013.0749
                   ESB-2013.0678
                   ESB-2013.0677
                   ESB-2013.0676
                   ESB-2013.0671
                   ESB-2013.0652
                   ESB-2013.0648
                   ESB-2013.0642

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21638802

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: IBM Tivoli Directory Integrator can be affected by 
vulnerabilities in the IBM Java Runtime Environment (CVE-2013-0440, 
CVE-2013-0443, CVE-2013-0169)

Flash (Alert)

Abstract

CVE-2013-0440 - Unspecified vulnerability in IBM Java Runtime Environment 
allows remote attackers to affect availability via vectors related to JSSE.

CVE- 2013-0443 - Unspecified vulnerability in IBM Java Runtime Environment 
allows remote attackers to affect confidentiality and integrity via vectors 
related to JSSE

CVE-2013-0169 - The Transport Layer Security protocol does not properly 
consider timing side-channel attacks, which allows remote attackers to 
conduct distinguishing attacks and plain-text recovery attacks via statistical 
analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

Content

VULNERABILITY DETAILS:

DESCRIPTION: 

CVE-2013-0440
The current implementation of the Java Secure Socket Extension {“JSSE”} 
provider shipped with the IBM Java Runtime Environment may allow remote 
attackers to affect availability of the application.

The attack does not require local network access nor does it require 
authentication, but some degree of specialized knowledge and techniques are 
required. An exploit would not impact the confidentiality of information or 
the integrity of data, but could reduce performance / cause interruptions to 
availability.


CVEID: 
CVE-2013-0440 

CVSS Base Score: 5
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/81799
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

DESCRIPTION: 

CVE-2013-0443
Unspecified vulnerability in IBM Java Runtime Environment allows remote 
attackers to affect confidentiality and integrity via vectors related to JSSE


The attack does not require local network access nor does it require 
authentication, but a large degree of specialized knowledge and techniques are 
required. An exploit may have a limited impact the confidentiality of 
information and the integrity of data, but the availability of the system would 
not be compromised.

CVEID: 
CVE-2013-0443

CVSS Base Score: 4
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/81801
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N)

DESCRIPTION: 

CVE-2013-0169
A weakness in the handling of cipher-block chaining (CBC) ciphersuites in 
Secure Sockets Layer (SSL), Transport Layer Security (TLS) and Datagram 
Transport Layer Security (DTLS) could lead to plaintext recovery of sensitive 
information by exploiting timing differences arising during message 
authentication codes (MAC) processing. The CVSS score is based on IBM X-Force 
rankings, which sets the access complexity for this vulnerability as Medium. 

The attack does not require local network access nor does it require 
authentication, but some degree of specialized knowledge and techniques are 
required. An exploit may have a limited impact on the confidentiality of 
information but neither the integrity of data nor the availability of the 
system would be compromised.

CVEID: 
CVE-2013-0169

CVSS Base Score: 4.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/81902
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)


AFFECTED PRODUCTS AND VERSIONS: 
IBM Tivoli Directory Integrator v6.1.1, v7.0, v7.1 and v7.1.1


REMEDIATION: 

The following IBM Java Runtime Environments (JREs) have the fixes for this 
vulnerability:

5.0.0 SR16 FP1 
6.0.0 SR13 FP2

For Tivoli Directory Integrator (TDI) v6.1.1 and v7.0: 

Upgrade to LA fix 7.0.0-TIV-TDI-LA0015

For Tivoli Directory Integrator (TDI) v7.1 and v7.1.1: 

Upgrade to LA fix 7.1.1-TIV-TDI-LA0011

Contact TDI Level 2 support to obtain the above specified LA fixes. 


Workaround(s): 
None

Mitigation(s): 
None

REFERENCES: 
· Complete CVSS Guide
· On-line Calculator V2 
· CVE-2013-0440
· CVE-2013-0443
· CVE-2013-0169
· http://xforce.iss.net/xforce/xfdb/81799
· http://xforce.iss.net/xforce/xfdb/81801
· http://xforce.iss.net/xforce/xfdb/81902
· TDI Level 2 support


RELATED INFORMATION: 
· IBM Secure Engineering Web Portal 
· IBM Product Security Incident Response Blog

ACKNOWLEDGEMENT
None


CHANGE HISTORY
31st May 2013 - Original Copy Published


*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of 
this vulnerability in their environments by accessing the links in the 
Reference section of this Flash.

Note: According to the Forum of Incident Response and Security Teams (FIRST), 
the Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=tRuN
-----END PGP SIGNATURE-----