-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.1082
  Rational Host On-Demand clients affected by vulnerabilities in IBM JRE
                               7 August 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Rational Host On-Demand
Publisher:         IBM
Operating System:  Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Modify Arbitrary Files          -- Remote/Unauthenticated
                   Delete Arbitrary Files          -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Access Confidential Data        -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-2440 CVE-2013-2439 CVE-2013-2438
                   CVE-2013-2436 CVE-2013-2435 CVE-2013-2434
                   CVE-2013-2433 CVE-2013-2432 CVE-2013-2431
                   CVE-2013-2430 CVE-2013-2429 CVE-2013-2428
                   CVE-2013-2427 CVE-2013-2426 CVE-2013-2425
                   CVE-2013-2424 CVE-2013-2423 CVE-2013-2422
                   CVE-2013-2421 CVE-2013-2420 CVE-2013-2419
                   CVE-2013-2418 CVE-2013-2417 CVE-2013-2416
                   CVE-2013-2415 CVE-2013-2414 CVE-2013-2394
                   CVE-2013-2384 CVE-2013-2383 CVE-2013-1569
                   CVE-2013-1564 CVE-2013-1563 CVE-2013-1561
                   CVE-2013-1558 CVE-2013-1557 CVE-2013-1540
                   CVE-2013-1537 CVE-2013-1518 CVE-2013-1491
                   CVE-2013-1488 CVE-2013-0440 CVE-2013-0402
                   CVE-2013-0401 CVE-2013-0169 

Reference:         ASB-2013.0069
                   ASB-2013.0058
                   ASB-2013.0057
                   ASB-2013.0025
                   ASB-2013.0013
                   ESB-2013.1077
                   ESB-2013.1067
                   ESB-2013.1066
                   ESB-2013.1065
                   ESB-2013.1054
                   ESB-2013.1052

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21640763

- --------------------------BEGIN INCLUDED TEXT--------------------

Rational Host On-Demand clients affected by vulnerabilities in IBM JRE

Flash (Alert)

Document information

Rational Host On-Demand

General Information

Software version:
11.0.8

Operating system(s):
Windows

Reference #:
1640763

Modified date:
2013-07-31

Abstract

IBM Rational Host On-Demand provides a Java JRE as part of its server package 
for clients to download and install on client machines. The vulnerabilities are
only applicable to client-side java deployments where untrusted code may be 
executed (such as Java applets running in a web browser). Server applications 
such as Host On-Demand server are not vulnerable.

Content

VULNERABILITY DETAILS:

CVE IDs:
CVE-2013-2422,CVE-2013-1491,CVE-2013-2435,CVE-2013-2420,CVE-2013-2432,
CVE-2013-2434,CVE-2013-1569,CVE-2013-2384,CVE-2013-2383,CVE-2013-1557,
CVE-2013-1537,CVE-2013-1558,CVE-2013-2440,CVE-2013-1518,CVE-2013-1488,
CVE-2013-2421,CVE-2013-2426,CVE-2013-2436,CVE-2013-2429,CVE-2013-2430,
CVE-2013-1563,CVE-2013-2394,CVE-2013-0401,CVE-2013-2438,CVE-2013-2424,
CVE-2013-2419,CVE-2013-2417,CVE-2013-2418,CVE-2013-1540,CVE-2013-2423,
CVE-2013-2416,CVE-2013-2415,CVE-2013-0169

DESCRIPTION:
There are a number of vulnerabilities in the IBM JAVA SDK versions that affect
various components, Some of the issues need to be combined in sequence to 
achieve an exploit. This occurs when the affected JRE is installed as the 
system JRE

This advisory is only applicable to client-side Java deployments where 
untrusted code may be executed (such as Java applets running in a web browser).
The vulnerabilities work by exploiting weaknesses in the internal 
implementation of various IBM SDK components. Some of the weaknesses need to be
combined in sequence to achieve an exploit. All of the issues are only 
applicable to scenarios in which untrusted code is executed under a security
manager. The exploits allow untrusted code to elevate its privileges by 
modifying or removing the security manager.

The most common vulnerable use case is a JRE running an untrusted Java applet
or Java Web Start application. This occurs when the affected JRE is installed 
as the system JRE.

CVEID: CVE-2013-1518
CVSS Base Score: 10
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83566
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-1537
CVSS Base Score: 10
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83571
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-1557
CVSS Base Score: 10
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83572
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-1540
CVSS Base Score: 4.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83590
CVSS Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-1569
CVSS Base Score: 10
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83557
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVEID: CVE-2013-1558
CVSS Base Score: 10
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83561
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVEID: CVE-2013-1563
CVSS Base Score: 7.6
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83579
CVSS Vector: (AV:N/AC:H/Au:N/C:C/I:C/A:C)


CVEID: CVE-2013-1561
CVSS Base Score: 5
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83583
CVSS Vector: (AV:N/AC:H/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-1564
CVSS Base Score: 5
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83584
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVEID: CVE-2013-2383
CVSS Base Score: 10
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83555
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-2384
CVSS Base Score: 10
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83556
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-2420
CVSS Base Score: 10
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83560
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVEID: CVE-2013-2414
CVSS Base Score: 10
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83567
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-2421
CVSS Base Score: 9.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83573
CVSS Vector: (AV:N/AC:H/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-2394
CVSS Base Score: 7.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83576
CVSS Vector: (AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-2419
CVSS Base Score: 9.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83581
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVEID: CVE-2013-2417
CVSS Base Score: 5
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83586
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:N)

CVEID: CVE-2013-2418
CVSS Base Score: 4.6
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83587
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVEID: CVE-2013-2416
CVSS Base Score: 4.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83588
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVEID: CVE-2013-2415
CVSS Base Score: 2.1
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83592
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVEID: CVE-2013-2434
CVSS Base Score: 10
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83558
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-2432
CVSS Base Score: 10
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83559
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-2440
CVSS Base Score: 10
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83562
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVEID: CVE-2013-2435
CVSS Base Score: 10
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83563
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-0440
CVSS Base Score: 5
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/81799
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVEID: CVE-2013-2431
CVSS Base Score: 10
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83564
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-2425
CVSS Base Score: 10
CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/83565
CVSS Vector: (AV:/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-2428
CVSS Base Score: 10
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83568
CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N)

CVEID: CVE-2013-2427
CVSS Base Score: 10
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83569
CVSS Vector: (AV:N/AC:H/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-2422
CVSS Base Score: 10
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83570
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-2426
CVSS Base Score: 9.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83574
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-2436
CVSS Base Score: 9.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83575
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-2430
CVSS Base Score: 7.6
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83577
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVEID: CVE-2013-2429
CVSS Base Score: 7.6
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83578
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVEID: CVE-2013-2439
CVSS Base Score: 6.9
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83580
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-2424
CVSS Base Score: 5
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83582
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-2438
CVSS Base Score: 5
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83585
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVEID: CVE-2013-2433
CVSS Base Score: 4.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83589
CVSS Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-2423
CVSS Base Score: 9.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83591
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-0401
CVSS Base Score: 9.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/82823
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-0402
CVSS Base Score: 9.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/82822
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-1488
CVSS Base Score: 9.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/82821
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-1491
CVSS Base Score: 9.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/82822
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2013-0169
CVSS Base Score: 4.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/81902
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

AFFECTED PRODUCTS:
IBM JRE shipped with Host On-Demand 11.0.0. Through 11.0.7

REMEDIATION:
Customers should download the Host On-Demand Version 11.0.8 release from Fix 
Central and update the existing Host On-Demand.

NOTE to IBM Employees:
You will need to authenticate to Fix Central with your IBM Intranet ID then
proceed to download the packages.

Work around(s): None

Mitigation(s):
Do not visit untrusted websites while the browser has a vulnerable JRE enabled.

REFERENCES:
Complete CVSS Guide
On-line Calculator V2 (http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2)

CVE-2013-1518
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83566

CVE-2013-1537
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83571

CVE-2013-1557
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83572

CVE-2013-1540
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83590

CVE-2013-1569
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83557

CVE-2013-1558
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83561

CVE-2013-1563
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83579

CVE-2013-1561
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83583

CVE-2013-1564
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83584

CVE-2013-2383
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83555

CVE-2013-2384
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83556

CVE-2013-2420
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83560

CVE-2013-2414
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83567

CVE-2013-2421
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83573

CVE-2013-2394
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83576

CVE-2013-2419
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83581

CVE-2013-2417
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83586

CVE-2013-2418
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83587

CVE-2013-2416
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83588

CVE-2013-2415
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83592

CVE-2013-2434
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83558

CVE-2013-2432
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83559

CVE-2013-2440
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83562

CVE-2013-2435
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83563

CVE-2013-2431
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83564

CVE-2013-2425
CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/83565

CVE-2013-2428
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83568

CVE-2013-2427
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83569

CVE-2013-2422
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83570

CVE-2013-2426
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83574

CVE-2013-2436
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83575

CVE-2013-2430
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83577

CVE-2013-2429
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83578

CVE-2013-2439
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83580

CVE-2013-2424
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83582

CVE-2013-2438
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83585

CVE-2013-2433
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83589

CVE-2013-2423
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/83591

CVE-2013-0401
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/82823

CVE-2013-0402
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/82822

CVE-2013-1488
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/82821

CVE-2013-1491
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/82822

CVE-2013-0169
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/81902

ACKNOWLEDGEMENT: None

CHANGE HISTORY: None

*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact 
of this vulnerability in their environments by accessing the links in the 
Reference section of this Flash.

Note: According to the Forum of Incident Response and Security Teams (FIRST),
the Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Copyright and trademark information

IBM, the IBM logo and ibm.com are trademarks of International Business 
Machines Corp., registered in many jurisdictions worldwide. Other product and
service names might be trademarks of IBM or other companies. A current list 
of IBM trademarks is available on the Web at "Copyright and trademark 
information" at www.ibm.com/legal/copytrade.shtml.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=4Mpx
-----END PGP SIGNATURE-----