-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.0844
   Security Bulletin: IBM Sterling Connect:Direct Browser affected by a
         vulnerability in IBM Runtime Environment, Java Technology
                         Edition  (CVE-2014-0411)
                                29 May 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Sterling Connect:Direct
Publisher:         IBM
Operating System:  HP-UX
                   Linux variants
                   Solaris
                   Windows
Impact/Access:     Unauthorised Access -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-0411  

Reference:         ASB-2014.0005
                   ESB-2014.0814
                   ESB-2014.0708
                   ESB-2014.0704
                   ESB-2014.0703
                   ESB-2014.0678
                   ESB-2014.0623
                   ESB-2014.0546
                   ESB-2014.0538
                   ESB-2014.0503
                   ESB-2014.0385
                   ESB-2014.0383
                   ESB-2014.0376
                   ESB-2014.0368
                   ESB-2014.0350
                   ESB-2014.0335
                   ESB-2014.0305
                   ESB-2014.0294
                   ESB-2014.0289
                   ESB-2014.0271
                   ESB-2014.0251
                   ESB-2014.0210
                   ESB-2014.0156
                   ESB-2014.0136
                   ESB-2014.0128
                   ESB-2014.0114
                   ESB-2014.0102
                   ESB-2014.0065
                   ESB-2014.0058

Original Bulletin: 
   www-01.ibm.com/support/docview.wss?uid=swg21673003

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: IBM Sterling Connect:Direct Browser affected by a 
vulnerability in IBM Runtime Environment, Java Technology Edition 
(CVE-2014-0411)

Security Bulletin

Document information

More support for:

Sterling Connect:Direct

Software version:

1.4, 1.5

Operating system(s):

HP-UX, Linux, Solaris, Tandem NSK, Windows, z/OS

Reference #:

1673003

Modified date:

2014-05-16

Summary

IBM Sterling Connect:Direct Browser is shipped with IBM Runtime Environment, 
Java Technology Edition (the IBM RE), that is based on an Oracle Java Runtime
Environment (JRE). Oracle has released the January 2014 critical patch updates
(CPU) that contain security vulnerability fixes for the JRE. The IBM RE has 
been updated to incorporate these fixes and security fixes that are specific 
to the IBM RE. IBM Sterling Connect:Direct Browser is affected by one of the 
vulnerabilities in the CPU, and the IBM RE shipped with IBM Sterling 
Connect:Direct Browser has been updated to remediate the vulnerability.

Vulnerability Details

CVE ID: CVE-2014-0411

DESCRIPTION:

An unspecified vulnerability in Oracle Java SE related to the JSSE component 
has partial confidentiality impact, partial integrity impact, and no 
availability impact.

CVSS Base Score: 4.0

CVSS Temporal Score: See xfdb/http://xforce.iss.net/xforce/90357 for the 
current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N))

Affected Products and Versions

IBM Sterling Connect:Direct browser 1.5.0 through 1.5.0.2 iFix05

IBM Sterling Connect:Direct browser 1.4.0 through 1.4.11 iFix03

Remediation/Fixes

The recommended solution is to upgrade to the current release as soon as 
practical. Please see below for information about the fixes available.

Fix* 	VRMF 		APAR 	How to acquire fix

iFix 6 	1.5.0.2 	N/A	http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Other+software&product=ibm/Other+software/Sterling+Connect+Direct+Browser&release=1.5.0.2&platform=All&function=all

iFix4 	1.4.11 		N/A 	https://www14.software.ibm.com/webapp/iwm/web/reg/signup.do?source=swg-SterlngLegacyreq&lang=en_US

Workarounds and Mitigations

None

References

Complete CVSS Guide

On-line Calculator V2

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

Acknowledgement

None

Change History

16 May, 2014: Original version published

*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the 
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the 
Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBU4bKlRLndAQH1ShLAQJb0BAAnxRkDIPsbs4fD9kEz7iX5T8b482CmX9a
V/IEQaAvUlSJwr8Rn6QVfFev+QlGMjM2Je6aWFF2mWgm9448+gE1XovVCu8bMZ8R
k9llNfsq3nNMUJ/L5dlLa+OgAdrf5+imybhuk48rhyJlE3WO/ek0+79+2+uSqVfz
YBmhNXBQj5m56Mt6u/oMwqTp9mHbLJC2oFBglpzt1PJ7KMM13GPise/rcanHHdV/
7q5f7RbltwOq445ZO13w/Llzke4pyUKmvfZLdHdXQh1SLXm8+xRNNHd3GPFflaLT
FieNCXOr2Ht3Po4cMDcUiRCMn04g1soRjWSz4gibXR+VBwgRdnilgfOIe+N5Ysk4
1wwHF9zi/wesoKyeNh4KGHhkUWyww83o2wqzTuOA/u8/tymn2xQmfkbXjMEV7/8M
poqJdHEt+caMsuf4UKFbCl4qiLa9oBdc30vUjfip+5cTMTe0AEJoFUX9Di3zHV3F
Du6GgeqoqT0UJ2DFFJGhl8+H+yQH88X2mLn4nxahrrYsHPySUADyAcbmDXAW0BIL
c68zm3q3kcU5OjR9dE2BDqN1Ni5vJUCpwbunyvsMKKUOm85QTB8dh5Xk+Eu+7qsY
eeWCX16uVY/8/prfFkzZ7LX8POf9WZccy/YnBdHmLV1nlVlAfr5dbSnvKvKTpf3q
mve902GDawM=
=4qGr
-----END PGP SIGNATURE-----