Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2013.1717 Security Bulletin #3: IBM Tivoli System Automation for Multiplatforms 3.2.2 and 3.1.0 3 December 2013 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Tivoli System Automation for Multiplatforms Publisher: IBM Operating System: Linux variants Solaris Windows Impact/Access: Denial of Service -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2013-2407 Reference: ASB-2013.0075 ESB-2013.1524 ESB-2013.1491 ESB-2013.1194 ESB-2013.1077 Original Bulletin: http://www-01.ibm.com/support/docview.wss?uid=swg21657132 - --------------------------BEGIN INCLUDED TEXT-------------------- Security Bulletin #3: IBM Tivoli System Automation for Multiplatforms 3.2.2 and 3.1.0 Document information Tivoli System Automation for Multiplatforms Software version: 3.1, 3.2.2 Operating system(s): Linux, Solaris, Windows Software edition: All Editions Reference #: 1657132 Modified date: 2013-11-22 Technote (FAQ) Question Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation for Multiplatforms which may affect the product. Answer VULNERABILITY DETAILS: DESCRIPTION: There are multiple security vulnerabilities in the IBM Java Runtime Environment component, and all are applicable to IBM JRE 5.0. The IBM Tivoli System Automation for Multiplatforms adapter for IBM System Automation Application Manager includes an IBM Java Runtime Environment on platforms other than AIX. CVEIDs: CVE-2013-2407 CVE-2013-2407 CVSS Base Score: 6.4 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/85044 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:P) * The CVSS Environmental Score is specific to the customer environment and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the “References:†information section of this Flash. AFFECTED PRODUCTS AND VERSIONS: IBM Tivoli System Automation for Multiplatforms 3.1 – 3.2.2 REMEDIATION: A product upgrade to the latest IBM Tivoli System for Multiplatforms 3.2.2.7 is recommended. Please upgrade therefore to IBM Tivoli System for Multiplatforms 3.2.2, and apply then the mentioned fixpack 3.2.2.7. Customers still running on IBM Tivoli System for Multiplatforms 3.1 alternatively can apply an iFix that updates Java. Fix* Fixpack VRMF 3.2.2.7 APAR http://www.ibm.com/support/docview.wss?uid=swg24035462 How to acquire fix http://www.ibm.com/support/docview.wss?uid=swg24035462 Fix* iFix VRMF On top of 3.1.0.9 APAR Linux: http://www.ibm.com/eserver/support/fixes/fixcentral/swgquickorder?fixes=3.1.0.9-TIV-ITSAMP-Linux-IF0001&productid=Tivoli%20System%20Automation%20for%20Multiplatforms&brandid=4 Solaris: http://www.ibm.com/eserver/support/fixes/fixcentral/swgquickorder?fixes=3.1.0.9-TIV-ITSAMP-Solaris-IF0001&productid=Tivoli%20System%20Automation%20for%20Multiplatforms&brandid=4 Windows: http://www.ibm.com/eserver/support/fixes/fixcentral/swgquickorder?fixes=3.1.0.9-TIV-ITSAMP-Windows-IF0001&productid=Tivoli%20System%20Automation%20for%20Multiplatforms&brandid=4 How to acquire fix Linux: http://www.ibm.com/eserver/support/fixes/fixcentral/swgquickorder?fixes=3.1.0.9-TIV-ITSAMP-Linux-IF0001&productid=Tivoli%20System%20Automation%20for%20Multiplatforms&brandid=4 Solaris: http://www.ibm.com/eserver/support/fixes/fixcentral/swgquickorder?fixes=3.1.0.9-TIV-ITSAMP-Solaris-IF0001&productid=Tivoli%20System%20Automation%20for%20Multiplatforms&brandid=4 Windows: http://www.ibm.com/eserver/support/fixes/fixcentral/swgquickorder?fixes=3.1.0.9-TIV-ITSAMP-Windows-IF0001&productid=Tivoli%20System%20Automation%20for%20Multiplatforms&brandid=4 Workaround(s): <None> Mitigation(s): <None> REFERENCES: Complete CVSS Guide ( http://www.first.org/cvss/cvss-guide.html) On-line Calculator V2 ( http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2) CVE-2013-2407 ( http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-2407 , http://xforce.iss.net/xforce/xfdb/85044 ) RELATED INFORMATION: IBM Secure Engineering Web Portal CHANGE HISTORY <27 September 2013>: Document created <18 October 2013>: Document updated for SAMP V3.1 *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUp0kcBLndAQH1ShLAQISWBAAoo71gXL+k8TtNI+J4JTLbII7m9Lfaw5n PHcoCA6QmJr+lZJI3TwC4j+WXhkxdrBA2TFzd901dHzCwL5+8hgJmXLoqaX7X0+P N/z491/dNRhVSZb6e31DLstjYPiigMwsSPbSbFoAbRJTjMyl5M4FP5muRrQMWrPW 6pc28d0SfAHx5A3DpLl7FsWs224bZO3lXTw9C6FlUWoViSxw40ogThWteI+75La8 kPguqMCarZUgsynGzA/OgEVmrQNyuFs5i14zlsJe3B7WujbuGNp/W8rRS1Si5m4O i3a0vVfMEhZCZNY93o/wgkKlzTu9kAzZLCzqunV+GCaDEDbpLpokWlRYv+1hL44g nvjJ9WA7KIWCsKDZeWNxH+YvqWEeo2f5xFzwYOiqKQgMuclmte2LKlh9wfhOEPgd lIC9Z2CQpclJdfKX3tNdd0jsZxs+KBUcBIGNf9TYtPsgnRUBY0D5W5hE6W7QsWzW VcBg52VvqcRdxM1pbS/u+HDcUiJA7wrUHb+IiIc8J8qr1wCQ0KKQhbNB/sru8ZXW lbyCNTW4kW5wqDQH8zlv+++SPBepLQ62efJaX92E6RUKeN0ZYoI8tNOgcNeHR9RX u0RNj8tIRH4xzNsWrs6oIoS3GuXbaXYQtIk0HS50pWMMFs+p5YAGj8S/473oY0aW LwntY4ipd2I= =uSwf -----END PGP SIGNATURE-----