-----BEGIN PGP SIGNED MESSAGE-----
AUSCERT External Security Bulletin Redistribution
IBM WebSphere Cast Iron Security Bulletin: Multiple security
vulnerabilities in IBM JRE 6 and IBM JRE 7
9 July 2014
AusCERT Security Bulletin Summary
Product: IBM WebSphere Cast Iron
Operating System: Network Appliance
Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Access Privileged Data -- Remote/Unauthenticated
Access Confidential Data -- Remote with User Interaction
CVE Names: CVE-2014-0423 CVE-2014-0416 CVE-2014-0411
- --------------------------BEGIN INCLUDED TEXT--------------------
IBM WebSphere Cast Iron Security Bulletin: Multiple security vulnerabilities
in IBM JRE 6 and IBM JRE 7
More support for:
WebSphere Cast Iron Cloud integration
6.0.0, 184.108.40.206, 220.127.116.11, 18.104.22.168, 22.214.171.124, 126.96.36.199, 188.8.131.52, 6.1, 184.108.40.206,
220.127.116.11, 18.104.22.168, 22.214.171.124, 126.96.36.199, 188.8.131.52, 184.108.40.206, 220.127.116.11, 18.104.22.168,
22.214.171.124, 126.96.36.199, 6.3, 188.8.131.52, 184.108.40.206, 220.127.116.11, 18.104.22.168, 7.0.0
Cloud, Physical, Virtual
Multiple security vulnerabilities exist in the IBM Java Runtime Environment
component of WebSphere Cast Iron in IBM JRE 6.0 SR15 (and earlier) and
IBM JRE 7.0 SR5 (and earlier)
There are multiple security vulnerabilities in the IBM Java Runtime
Environment used in WebSphere Cast Iron.
The DocumentHandler used by the java.beans.XMLDecoder implementation allows
the use of external entities by default. This facilitates a variety of
attacks via malicious XML data.
CVSS Base Score: 5.5
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/90340 for the
CVSS Environmental Score*: Undefined
CVSS Vector: (AV/N:AC/L:Au/S:C/P:I/N:A/P)
javax.security.auth.Subject is serializable but does not validate
deserialized data properly. Malicious code could exploit this to construct
an invalid Subject instance with content that differs from the advertised
properties. In addition, if a server deserializes serialized data from
untrusted sources, an attacker could insert an invalid instance of Subject
class into a server Java process.
CVSS Base Score: 5
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/90349 for the
CVSS Environmental Score*: Undefined
CVSS Vector: (AV/N:AC/L:Au/N:C/N:I/P:A/N)
Timing differences based on validity of TLS messages can be exploited
to decrypt the entire session. The exploit is not trivial, requiring a
man-in-the-middle position and a long time (around 20 hours).
CVSS Base Score: 4
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/90357 for the
CVSS Environmental Score*: Undefined
CVSS Vector: (AV/N:AC/H:Au/N:C/P:I/P:A/N)
*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Flash.
IBM WebSphere Cast Iron v6.0, v6.1 v6.3, v6.4 and v7.0 Studio, Virtual
Appliance and Physical Appliance
IBM WebSphere Cast Iron v6.3 and v7.0 Live SaaS offering.
None available; Apply the fix detailed below.
Apply the fix detailed below.
For WebSphere Cast Iron version v6.0 :
Install the v22.214.171.124 interim fix or upgrade to v126.96.36.199/v188.8.131.52/v184.108.40.206
by applying the relevant interim fix.
For WebSphere Cast Iron version v6.1 *:
Install the v220.127.116.11 interim fix or upgrade to v18.104.22.168/v22.214.171.124/v126.96.36.199
by applying the relevant interim fix/fixpack.
For IBM WebSphere Cast Iron v6.3 *:
Install the v188.8.131.52 interim fix or upgrade to v184.108.40.206/v220.127.116.11 by applying
the relevant interim fix/fixpack.
For IBM WebSphere Cast Iron v6.4 *:
Install the v18.104.22.168 interim fix or upgrade to v22.214.171.124 by applying the
For IBM WebSphere Cast Iron v7.0:
Upgrade to v126.96.36.199 by applying the fixpack.
* Upgrade to v7 should not be attempted on v6.1, v6.3, v6.4 virtual appliance
if the appliance was originally a fresh install of v6 and later upgraded
to a higher version. Please refer to this link.
The WebSphere Cast Iron V6.0 interim fix can be obtained via this link
The WebSphere Cast Iron V6.1 interim fix can be obtained via this link
The WebSphere Cast Iron V6.3 interim fix can be obtained via this link
The WebSphere Cast Iron V6.4 interim fix can be obtained via this link
The WebSphere Cast Iron V188.8.131.52 fixpack can be obtained via this link
SaaS offering (WebSphere Cast Iron Live v6.3):
The WebSphere Cast Iron V6.3 SaaS offering is scheduled to be updated
during July 2014's maintenance window to address the IBM Java Security
SaaS offering (WebSphere Cast Iron Live v7.0):
The WebSphere Cast Iron V7.0 SaaS offering is updated to address the IBM
Java Security Vulnerability.
APAR LI77896 is targeted for availability in IBM WebSphere Cast Iron
v184.108.40.206, v220.127.116.11, v18.104.22.168 and v22.214.171.124.
Complete CVSS Guide (http://www.first.org/cvss/cvss-guide.html)
On-line Calculator V2 (http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2)
<2014/06/30>: Original Copy Published
Note: According to the Forum of Incident Response and Security Teams (FIRST),
the Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to firstname.lastname@example.org
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
Australian Computer Emergency Response Team
The University of Queensland
Internet Email: email@example.com
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----