-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.1390
       Security Bulletin: Java Vulnerability in Rational Automation
                         Framework (CVE-2013-0169)
                              4 October 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Rational Automation Framework
Publisher:         IBM
Operating System:  AIX
                   Linux variants
                   Solaris
                   Windows
Impact/Access:     Access Privileged Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-0169  

Reference:         ESB-2013.0183
                   ESB-2013.0161

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21649999

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Java Vulnerability in Rational Automation Framework 
(CVE-2013-0169)

Flash (Alert)

Document information
Rational Automation Framework
General Information

Software version:
3.0, 3.0.0.1, 3.0.0.2, 3.0.0.3, 3.0.0.4, 3.0.0.5, 3.0.1

Operating system(s):
AIX, Linux, Solaris, Windows

Reference #:
1649999

Modified date:
2013-09-27

Abstract

Previous releases of IBM Rational Automation Framework are affected by a 
vulnerability in Java that may allow remote attackers to execute 
plaintext-recovery attacks.

Content

VULNERABILITY DETAILS:
CVE ID: CVE-2013-0169

DESCRIPTION: 
Unspecified vulnerability in IBM Java Runtime Environment may allow remote 
attackers to conduct distinguishing attacks and plaintext-recovery via 
statistical analysis of timing data for crafted packets.

Note that despite the public disclosure, the issue is largely theoretical and 
very difficult to exploit in real world scenarios.

CVSS Base Score: 4.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/81902 for the 
current score
CVSS Environmental Score*: Undefined 
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

AFFECTED PRODUCTS AND VERSIONS:
Rational Automation Framework v3.0.1.1 and earlier on all supported platforms.

REMEDIATION:
The recommended solution is to upgrade to Rational Automation Framework 
v3.0.1.1 as soon as practical. Please see below for information about the 
fixes available.

Vendor Fix(es): 
For all affected versions of Rational Automation Framework
Upgrade to Rational Automation Framework version 3.0.1.1

If you are unable to upgrade, contact IBM Technical Support.

Workaround(s): 
Not applicable; upgrade to version 3.0.1.1 for Rational Automation Framework

Mitigation(s): 
None



REFERENCES:  

Complete CVSS Guide  
On-line Calculator V2  

RELATED INFORMATION:  
IBM Secure Engineering Web Portal  
IBM Product Security Incident Response Blog  

CHANGE HISTORY: 
27 September 2013: Original copy published 

*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of 
this vulnerability in their environments by accessing the links in the 
References section of this alert.  

Note:  According to the Forum of Incident Response and Security Teams (FIRST), 
the Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=BShc
-----END PGP SIGNATURE-----