-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.0819
         Security Bulletin: IBM Tivoli Directory Server CPU utili
            zation - shipped with AIX and VIOS (CVE-2014-0963)
                                26 May 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Tivoli Directory Server
Publisher:         IBM
Operating System:  AIX
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-0963  

Reference:         ESB-2014.0815
                   ESB-2014.0783
                   ESB-2014.0782
                   ESB-2014.0764
                   ESB-2014.0714
                   ESB-2014.0679

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=isg3T1020849

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: IBM Tivoli Directory Server CPU utilization - shipped with
AIX and VIOS (CVE-2014-0963)

Security Bulletin

Summary

IBM Security Directory Server, formerly known as IBM Tivoli Directory Server,
is affected by a problem that is related to the Secure Sockets Layer (SSL) 
implementation. Some conditions can cause the processor utilization to rapidly
increase, resulting in a denial of service.

Vulnerability Details

CVE ID: CVE-2014-0963

CVSS and DESCRIPTION: Please refer to the following link:

IBM Security Directory Server CPU utilization (CVE-2014-0963)

Affected Products and Versions

AIX 5.3, 6.1 and 7.1.

VIOS 2.2.x

Remediation/Fixes

The GSKit package contains a fix and needs to be installed on AIX/VIOS 
systems.

If your GSKit is older than the corresponding levels that are in the following
list, update your GSKit to the specified version, or later. To determine 
which version of the GSKit component is installed, enter the following 
command:

lslpp -l | grep -i gsk

The fixes for the GSKit components can be downloaded at the following links:

GSKit V7.0.4.50

GSKit V8.0.14.43

GSKit V8.0.50.20

When you are using GSKitV8, your IBM Security Directory Server or IBM Tivoli 
Directory Server must be at version 6.3.0.26 or higher. This version avoids a
compatibility issue between the IBM Security Directory Server component and 
the new GSKitV8 fix packs. Refer to the above mentioned link under "CVSS and 
DESCRIPTIONS". To determine the installed version of the IBM Security 
Directory Server, enter the following command:

lslpp -l | grep idsldap

References

Complete CVSS Guide

On-line Calculator V2

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

Change History

19 May 2014: Original Copy Published

*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the 
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the 
Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Cross reference information 
	
Segment 		Product 		Component 	Platform 	Version 	Edition

Operating System (AIX) 	AIX Enterprise Edition 			AIX 		5.3, 6.1, 7.1

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=tAS1
-----END PGP SIGNATURE-----