-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.1008
         Multiple vulnerabilities have been identified within IBM
                           Tivoli Netcool System
                               20 June 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Tivoli Netcool System Service Monitors
Publisher:         IBM
Operating System:  Linux variants
                   Windows
                   Solaris
                   AIX
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Access Privileged Data          -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Provide Misleading Information  -- Remote/Unauthenticated
                   Unauthorised Access             -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-3470 CVE-2014-0224 CVE-2014-0221
                   CVE-2014-0195 CVE-2014-0139 CVE-2014-0138
                   CVE-2013-6450 CVE-2013-6449 CVE-2013-4353

Reference:         ASB-2014.0073
                   ASB-2014.0071
                   ASB-2014.0069.2
                   ASB-2014.0068
                   ESB-2014.0082
                   ESB-2014.0056
                   ESB-2014.0025
                   ESB-2014.0021
                   ESB-2014.0007

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21675818
   http://www-01.ibm.com/support/docview.wss?uid=swg21675821
   http://www-01.ibm.com/support/docview.wss?uid=swg21675820

Comment: This bulletin contains three (3) IBM security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: IBM Tivoli Netcool System Service Monitors/Application
Service Monitors is affected by vulnerabilities in OpenSSL (CVE-2013-4353,
CVE-2013-6450 and CVE-2013-6449)

Security Bulletin

More support for:

Netcool/System Service Monitor
Netcool System Service Monitor

Software version:
4.0

Operating system(s):
All

Reference #:
1675818

Modified date:
2014-06-16

Summary

Security vulnerabilities have been discovered in OpenSSL.

Vulnerability Details

CVE-ID: CVE-2013-4353

DESCRIPTION: A carefully crafted invalid TLS handshake could crash OpenSSL
with a NULL pointer exception. A malicious server could use this flaw to
crash a connecting client. This issue only affected OpenSSL 1.0.1 versions.

CVSS Base Score: 5
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/90201
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-ID: CVE-2013-6450

DESCRIPTION: A flaw in DTLS handling can cause an application using
OpenSSL and DTLS to crash. This is not a vulnerability for OpenSSL prior
to 1.0.0. OpenSSL is vulnerable to a denial of service, caused by the
failure to properly maintain data structures for digest and encryption
contexts by the DTLS retransmission implementation. A remote attacker
could exploit this vulnerability to cause the daemon to crash.

CVSS Base Score: 4.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/90069
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-ID: CVE-2013-6449

DESCRIPTION: A flaw in OpenSSL can cause an application using OpenSSL
to crash when using TLS version 1.2. This issue only affected OpenSSL
1.0.1 versions.

OpenSSL is vulnerable to a denial of service, caused by an error in
the ssl_get_algorithm2 function. A remote attacker could exploit this
vulnerability using specially-crafted traffic from a TLS 1.2 client to
cause the daemon to crash.

CVSS Base Score: 4.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/90068
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)

Affected Products and Versions

SSM 4.0.0 FP1 - FP14
SSM 4.0.1 FP1 and earlier

Remediation/Fixes

For Version 4.0.0
- - Apply SSM 4.0.0.14 Interim Fix 01:
http://www-01.ibm.com/support/docview.wss?rs=0&uid=isg400001759
For Version 4.0.1
- - Apply SSM 4.0.1.1 Interim Fix 01:
http://www-01.ibm.com/support/docview.wss?rs=0&uid=isg400001769

Workarounds and Mitigations

None known

References
Complete CVSS Guide
On-line Calculator V2
OpenSSL Project vulnerability website

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowledgement

None

Change History

2014 April 15 Original Copy Published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

- -------------------------------------------------------------------------------
Security Bulletin: IBM Tivoli Netcool System Service Monitors/Application
Service Monitors is affected by the following OpenSSL vulnerabilities:
(CVE-2014-0224,CVE-2014-0221, CVE-2014-0195 and CVE-2014-3470)

Security Bulletin

Document information

More support for:
Netcool/System Service Monitor
Netcool System Service Monitor

Software version:
4.0

Operating system(s):
All

Reference #:
1675821

Modified date:
2014-06-16

Summary

Security vulnerabilities have been discovered in OpenSSL that were reported
on June 5, 2014 by the OpenSSL Project.

Vulnerability Details

CVE-ID: CVE-2014-0224
DESCRIPTION: OpenSSL is vulnerable to a man-in-the-middle attack, caused
by the use of weak keying material in SSL/TLS clients and servers. A
remote attacker could exploit this vulnerability using a specially-crafted
handshake to conduct man-in-the-middle attacks to decrypt and modify traffic.

CVSS Base Score: 5.8
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93586 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)

CVE-ID: CVE-2014-0221

DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by a
recursion error in the DTLS client. By sending an invalid DTLS handshake,
a remote attacker could exploit this vulnerability to cause the application
to crash.

CVSS Base Score: 4.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93587 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-ID: CVE-2014-0195

DESCRIPTION: OpenSSL is vulnerable to a buffer overflow. By sending invalid
DTLS packet fragments, a remote attacker could exploit this vulnerability
to overrun the client or server and execute arbitrary code on a DTLS client
or server.

CVSS Base Score: 7.5
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93588 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE-ID: CVE-2014-3470

DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by the
implementation of anonymous ECDH ciphersuites. A remote attacker could
exploit this vulnerability to cause a denial of service.

CVSS Base Score: 4.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93589 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)

Affected Products and Versions

SSM 4.0.0 FP1 - FP14 and Interim Fix 14-02
SSM 4.0.1 FP1 and Interim Fix 01-01

Remediation/Fixes

For Version 4.0.0
- - Apply SSM 4.0.0.14 Interim Fix 03:
http://www.ibm.com/support/docview.wss?uid=isg400001838
For Version 4.0.1
- - Apply SSM 4.0.1.1 Interim Fix 02:
http://www.ibm.com/support/docview.wss?uid=isg400001832

Workarounds and Mitigations

None known

References
Complete CVSS Guide
On-line Calculator V2
OpenSSL Project vulnerability website

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowledgement

None

Change History

16 June 2014: Original Version Published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- -------------------------------------------------------------------------------

Security Bulletin: IBM Tivoli Netcool System Service Monitors/Application
Service Monitors is affected by the following libcURL vulnerabilities:
(CVE-2014-0139, CVE-2014-0138)

Security Bulletin

Document information

More support for:
Netcool/System Service Monitor
Netcool System Service Monitor

Software version:
4.0

Operating system(s):
All

Reference #:
1675820

Modified date:
2014-06-16

Summary

Security vulnerabilities have been discovered in Open Source cURL/libcURL
that were reported on March 26, 2014 by the cURL/libcURL Project.

Vulnerability Details

CVE-ID: CVE-2014-0139
DESCRIPTION: cURL/libcURL could allow a remote attacker to bypass security
restrictions, caused by an error in the hostmatch() function when validating
certificates containing an IP address with a wildcard match within the
Common Name field. By sending a specially-crafted SSL certificate containing
wildcard characters, a remote attacker could exploit this vulnerability
to spoof the server and launch further attacks on the system.

CVSS Base Score: 4.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/92130 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVE-ID: CVE-2014-0138

DESCRIPTION: cURL/libcURL could allow a remote attacker to bypass security
restrictions, caused by the re-use of previously used connections when
processing new requests. An attacker could exploit this vulnerability to
hijack the privileges of a different user's session and launch further
attacks on the system.

CVSS Base Score: 6.4
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/92131 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:P)

Affected Products and Versions

SSM 4.0.0 FP1 - FP14 and Interim Fix 14-02

SSM 4.0.1 FP1 and Interim Fix 01-01

Remediation/Fixes

For Version 4.0.0
- - Apply SSM 4.0.0.14 Interim Fix 03:
http://www.ibm.com/support/docview.wss?uid=isg400001838
For Version 4.0.1
- - Apply SSM 4.0.1.1 Interim Fix 02:
http://www.ibm.com/support/docview.wss?uid=isg400001832

Workarounds and Mitigations

None known

References
Complete CVSS Guide
On-line Calculator V2
cURL Project vulnerability website

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowledgement

None
Change History

16 June 2014: Original Version Published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=GmwB
-----END PGP SIGNATURE-----