-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.0157
        DB2 Recovery Expert for Linux, UNIX and Windows is affected
              by a vulnerability in IBM Java (CVE-2013-5780)
                              5 February 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM DB2 Recovery Expert
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-5780  

Reference:         ASB-2013.0124
                   ASB-2013.0113
                   ESB-2014.0132
                   ESB-2013.1778
                   ESB-2013.1777
                   ESB-2013.1743
                   ESB-2013.1696
                   ESB-2013.1594
                   ESB-2013.1593
                   ESB-2013.1592
                   ESB-2013.1577
                   ESB-2013.1511
                   ESB-2013.1499
                   ESB-2013.1493
                   ESB-2013.1480
                   ESB-2013.1468

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21663589

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: DB2 Recovery Expert for Linux, UNIX and Windows is affected
by a vulnerability in IBM Java (CVE-2013-5780)

Flash (Alert)

Document information

More support for:

DB2 Recovery Expert for Linux, UNIX and Windows

Software version:

3.1.0, 4.1.0

Operating system(s):

AIX, HP-UX, Linux, Solaris, Windows

Reference #:

1663589

Modified date:

2014-02-03

Abstract

An unspecified vulnerability in IBM's JRE related to the Libraries component 
could allow a remote attacker to obtain sensitive information. 

Content

VULNERABILITY DETAILS:

CVE ID: CVE-2013-5780

CVSS:

CVSS Base Score: 4.3

CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/88001

CVSS Environmental Score*: Undefined

CVSS Vector: (AV/N:AC/M:Au/N:C/P:I/N:A/N)

AFFECTED PRODUCTS:

IBM DB2 Recovery Expert for Linux, UNIX, and Windows version 3.1.0.0 through 
4.1.0.0

REMEDIATION:

If you are using DB2 Recovery Expert V4.1.0.0, go to IBM Fix Central and 
download the latest interim fix, IF4.

If you are using any release of DB2 Recovery Expert prior to V4.1.0.0, to 
remove the security vulnerability, you must replace the IBM JRE that is 
installed with IBM DB2 Recovery Expert for Linux, UNIX, and Windows with the 
latest IBM JRE. Detailed instructions are provided in the technote Updating 
the JRE for DB2 Recovery Expert for Linux, UNIX and Windows. See: 
http://www-01.ibm.com/support/docview.wss?uid=swg21644942

For further assistance contact IBM Technical Support.

VENDOR FIX:

Existing customers are recommended to upgrade.

WORKAROUND(S) & MITIGATION(S):

None

REFERENCES:

Complete CVSS Guide

On-line Calculator V2

RELATED INFORMATION:

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

ACKNOWLEDGEMENT:

None

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBUvG71hLndAQH1ShLAQK5KA//duB29ExbRcrC6OIZMu7Eh35s+KM0L7Zy
Sl6pdUL6TJqlWNiieDJECQnzxrb7PfZ1flMtD2g2zR4+qLKgy83Iq/sSkQbN8Or+
i9n9lutROQgyygYG1gaLbCoUKCF0r2Z7upWIIhg5b115Gvyd/RX9UoptWlRLDopy
JLsR5CILSUmE7LmMivLJw8pYL/4H6kC5+uXST/+oZLy0SIf+NOzM0P6+ftnJW5e2
79AnFWRcQgkEDzs0ooq/RSt4yAA5xKdoQbBRo5NMooJTLExKawfGmHR3hsiZPHJU
e4Cp5As+ASDiaIil1BZfoimhIyh78/LNyKRvCb8uVQL2wJHfnhjGRlbjM8coLZWS
u7fPSfwRjkwDe2ufYQNYHmlBeE13eh7lQeBJJyxbK+A7sa5bElOG2vLOKZ6MHd9r
utSUYUDGLeJjH9/OmZlnRW+IixlTnfkp2kAyhO7S0mBtOB9ibdAGY9R1t37v/v/Q
SwgrjuFaEzH9FhFg8h1uRQvmAHk+RWOHqaAMhXmEsDTp9N36Y8LZzOhbo37VyRTx
VHF0p20shXJUAhqpkTws/lMvActzOSCUNO1ybGffaICuLmSPBUAFGrFp3ptVI8p/
cnVWo1v7mLWQVKAK0AJVZ6Io8Dg615DNTAF9nPNco9wDKYCud0nRpcKthd46rjLi
LYkPxx5FaSI=
=IpYU
-----END PGP SIGNATURE-----