-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.1118
       IBM WebSphere Cast Iron Security Bulletin: Multiple security
                vulnerabilities in IBM JRE 6 and IBM JRE 7
                                9 July 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM WebSphere Cast Iron
Publisher:         IBM
Operating System:  Network Appliance
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                   Access Privileged Data          -- Remote/Unauthenticated      
                   Access Confidential Data        -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-0423 CVE-2014-0416 CVE-2014-0411

Reference:         ASB-2014.0005
                   ESB-2014.1100
                   ESB-2014.1090
                   ESB-2014.0982
                   ESB-2014.0114
                   ESB-2014.0102
                   ESB-2014.0065
                   ESB-2014.0058

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21677388

- --------------------------BEGIN INCLUDED TEXT--------------------

IBM WebSphere Cast Iron Security Bulletin: Multiple security vulnerabilities
in IBM JRE 6 and IBM JRE 7

Flash (Alert)

Document information

More support for:
WebSphere Cast Iron Cloud integration

Software version:
6.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.0.0.4, 6.0.0.5, 6.0.0.6, 6.1, 6.1.0.1,
6.1.0.2, 6.1.0.3, 6.1.0.4, 6.1.0.6, 6.1.0.7, 6.1.0.8, 6.1.0.9, 6.1.0.10,
6.1.0.12, 6.1.0.15, 6.3, 6.3.0.1, 6.3.0.2, 6.4.0.0, 6.4.0.1, 7.0.0

Operating system(s):
Firmware

Software edition:
Cloud, Physical, Virtual

Reference #:
1677388

Modified date:
2014-06-30


Abstract

Multiple security vulnerabilities exist in the IBM Java Runtime Environment
component of WebSphere Cast Iron in IBM JRE 6.0 SR15 (and earlier) and
IBM JRE 7.0 SR5 (and earlier)

Content

VULNERABILITY DETAILS
There are multiple security vulnerabilities in the IBM Java Runtime
Environment used in WebSphere Cast Iron.

CVEID: CVE-2014-0423

DESCRIPTION:

The DocumentHandler used by the java.beans.XMLDecoder implementation allows
the use of external entities by default. This facilitates a variety of
attacks via malicious XML data.

CVSS Base Score: 5.5
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/90340 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV/N:AC/L:Au/S:C/P:I/N:A/P)

CVEID: CVE-2014-0416

DESCRIPTION:

javax.security.auth.Subject is serializable but does not validate
deserialized data properly. Malicious code could exploit this to construct
an invalid Subject instance with content that differs from the advertised
properties. In addition, if a server deserializes serialized data from
untrusted sources, an attacker could insert an invalid instance of Subject
class into a server Java process.


CVSS Base Score: 5
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/90349 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV/N:AC/L:Au/N:C/N:I/P:A/N)

CVEID: CVE-2014-0411

DESCRIPTION:

Timing differences based on validity of TLS messages can be exploited
to decrypt the entire session. The exploit is not trivial, requiring a
man-in-the-middle position and a long time (around 20 hours).


CVSS Base Score: 4
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/90357 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV/N:AC/H:Au/N:C/P:I/P:A/N)

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Flash.

AFFECTED PLATFORMS:
IBM WebSphere Cast Iron v6.0, v6.1 v6.3, v6.4 and v7.0 Studio, Virtual
Appliance and Physical Appliance
IBM WebSphere Cast Iron v6.3 and v7.0 Live SaaS offering.

WORKAROUND:
None available; Apply the fix detailed below.

REMEDIATION:
Apply the fix detailed below.

FIX:
For WebSphere Cast Iron version v6.0 :
Install the v6.0.0.6 interim fix or upgrade to v6.1.0.15/v6.3.0.2/v6.4.0.1
by applying the relevant interim fix.

For WebSphere Cast Iron version v6.1 *:
Install the v6.1.0.15 interim fix or upgrade to v6.3.0.2/v6.4.0.1/v7.0.0.1
by applying the relevant interim fix/fixpack.

For IBM WebSphere Cast Iron v6.3 *:
Install the v6.3.0.2 interim fix or upgrade to v6.4.0.1/v7.0.0.1 by applying
the relevant interim fix/fixpack.

For IBM WebSphere Cast Iron v6.4 *:
Install the v6.4.0.1 interim fix or upgrade to v7.0.0.1 by applying the
fixpack.

For IBM WebSphere Cast Iron v7.0:
Upgrade to v7.0.0.1 by applying the fixpack.

* Upgrade to v7 should not be attempted on v6.1, v6.3, v6.4 virtual appliance
if the appliance was originally a fresh install of v6 and later upgraded
to a higher version. Please refer to this link.

The WebSphere Cast Iron V6.0 interim fix can be obtained via this link
The WebSphere Cast Iron V6.1 interim fix can be obtained via this link
The WebSphere Cast Iron V6.3 interim fix can be obtained via this link
The WebSphere Cast Iron V6.4 interim fix can be obtained via this link
The WebSphere Cast Iron V7.0.0.1 fixpack can be obtained via this link

SaaS offering (WebSphere Cast Iron Live v6.3):
The WebSphere Cast Iron V6.3 SaaS offering is scheduled to be updated
during July 2014's maintenance window to address the IBM Java Security
Vulnerability.

SaaS offering (WebSphere Cast Iron Live v7.0):
The WebSphere Cast Iron V7.0 SaaS offering is updated to address the IBM
Java Security Vulnerability.

APAR LI77896 is targeted for availability in IBM WebSphere Cast Iron
v6.0.0.7, v6.1.0.16, v6.3.0.3 and v6.4.0.2.

MITIGATION:
None known

REFERENCES:
Complete CVSS Guide (http://www.first.org/cvss/cvss-guide.html)
On-line Calculator V2 (http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2)

CVE-2014-0423(http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0423)
CVE-2014-0416(http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0416)
CVE-2014-0411(http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0411)

CHANGE HISTORY:
<2014/06/30>: Original Copy Published

Note: According to the Forum of Incident Response and Security Teams (FIRST),
the Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBU7zVcRLndAQH1ShLAQKk1Q//Weg6ct/5sai2AoHpHftimBXRPQGq4dJg
qT2xu8g+FKIVVid1kv6wOSaxhR61vEX3npSUcBXfTaR+lhRv9vp6oiJZD8i9D2qW
qviShhuyjgLCwNs16kKeibq5KrA+AGEhsvN1hz1B5eWeR37VeH+AtJz/nCpnmqyy
FmP78eoX5hubixXxuEpQgCewPV/OMvjcUcrI7qaOBUKMwriYTFs93sQVYOC/ZrIa
u0iKtvz9oaasJGQS5smI8nBH0KdRkx1zwJ3ZRMYBV89V6sDXsCkXbp/M8PaCUM4o
G7axT1PtYkuO/dlT6Q/LlidjBHJ8JETFOLHs4RaRacjloH84L9rHTWlmf57pCa7t
KUky+VUZoivpPeHRMw4ksJcUVqljslHD/b6vVTY6thmbgdwS+KaoWG7U2oC0jL+P
Qoys3pg0DY0/HPCx+hlev5UGi4JLoKw/IJXk2rnOWaWi0q4A5OqHlMtrDZy7+Umu
xJqPG5a2Snep55EITRX07hcU/h3I16KjouRQhgGbmf6BTtoedqlYC0bgcBZV1TwT
qdGl00RJGGwYNXiA8k963baijBtVmQ3VxKlDJ4n4sfcTzCGE1CCdKNLuAinN4n38
Geicr/BnvQQ/6gYHY+YXfbckrECl4lxqM9X7CmYIfuRrl+EsBoiCleu7tCxMCvWB
RZIGoLmXtFM=
=VxRz
-----END PGP SIGNATURE-----