Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2014.1301 Multiple vulnerabilities have been identified in IBM Tivoli Application Dependency Discovery Manager 5 August 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM Tivoli Application Dependency Discovry Manager Publisher: IBM Operating System: AIX Linux variants Solaris Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Modify Arbitrary Files -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Reduced Security -- Remote/Unauthenticated Unauthorised Access -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2014-2428 CVE-2014-2427 CVE-2014-2423 CVE-2014-2421 CVE-2014-2420 CVE-2014-2414 CVE-2014-2412 CVE-2014-2409 CVE-2014-2402 CVE-2014-2401 CVE-2014-2398 CVE-2014-1876 CVE-2014-0878 CVE-2014-0461 CVE-2014-0460 CVE-2014-0459 CVE-2014-0458 CVE-2014-0457 CVE-2014-0455 CVE-2014-0454 CVE-2014-0453 CVE-2014-0452 CVE-2014-0451 CVE-2014-0449 CVE-2014-0448 CVE-2014-0446 CVE-2014-0429 CVE-2014-0119 CVE-2014-0099 CVE-2014-0096 CVE-2014-0095 CVE-2014-0075 CVE-2014-0033 CVE-2013-6954 CVE-2013-6629 CVE-2013-4590 CVE-2013-4322 CVE-2013-4286 CVE-2012-3544 Reference: ASB-2014.0077 ASB-2014.0074 ASB-2014.0063 ESB-2013.1652 ESB-2013.0995 ESB-2013.0924 ESB-2013.0667 Original Bulletin: http://www-01.ibm.com/support/docview.wss?uid=swg21678892 http://www-01.ibm.com/support/docview.wss?uid=swg21678883 Comment: This bulletin contains two (2) IBM security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- Security Bulletin: Tivoli Application Dependency Discovery Manager - Open Source Tomcat issues reported between March - May 2014. Security Bulletin Document information More support for: Tivoli Application Dependency Discovery Manager Software version: 7.1.2, 7.2, 7.2.1, 7.2.2 Operating system(s): AIX, Linux, Solaris, Windows Reference #: 1678892 Modified date: 2014-07-30 Summary Security vulnerabilities exist in Open Source Tomcat reported between March and May 2014, that can affect the security of IBM Tivoli Application Dependency Discovery Manager (TADDM). Vulnerability Details CVE-ID: CVE-2013-4286 Description: Apache Tomcat is vulnerable to HTTP request smuggling, caused by an incomplete fix related to the handling of malicious request. By sending a specially-crafted request in a Transfer-Encoding: chunked header and a Content-length header to the Apache HTTP server that will be reassembled with the original Content-Length header value, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks. CVSS Base Score: 4.3 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/91426 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N) CVE-ID: CVE-2014-0033 Description: Apache Tomcat could allow a remote attacker to hijack a valid user's session, caused by an error even when disableURLRewriting is enabled. By persuading a victim to visit a specially-crafted link and log into the application, a remote attacker could exploit this vulnerability to hijack another user's account and possibly launch further attacks on the system. CVSS Base Score: 4.3 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/91423 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N) CVE-ID: CVE-2013-4322 Description: Apache Tomcat processes chunked transfer coding without properly handling a large total amount of chunked data or whitespace characters in an HTTP header value within a trailer field, which allows remote attackers to cause a denial of service by streaming data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3544. CVSS Base Score: 5 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/91625 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P) CVE-ID: CVE-2013-4590 Description: Apache Tomcat could allow a remote attacker to obtain sensitive information, caused by an XML External Entity Injection (XXE) error when running untrusted web applications. By sending a specially-crafted request, an attacker could exploit this vulnerability to read arbitrary files and obtain sensitive information. CVSS Base Score: 4.3 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/91424 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N) CVE-ID: CVE-2014-0075 Description: Apache Tomcat is vulnerable to a denial of service, caused by the improper handling of a malformed chunk size as part of a chucked request. A remote attacker could exploit this vulnerability to cause a denial of service. CVSS Base Score: 5 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/93365 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P) CVE-ID: CVE-2014-0095 Description: Apache Tomcat is vulnerable to a denial of service, caused by the improper handling of an AJP request. A remote attacker could exploit this vulnerability to consume a request processing thread and cause a denial of service. CVSS Base Score: 4.3 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/93366 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P) CVE-ID: CVE-2014-0096 Description: Apache Tomcat could allow a remote attacker to obtain sensitive information, caused by an XML External Entity Injection (XXE) error when processing XML data by the default server. By sending specially-crafted XML data, an attacker could exploit this vulnerability to obtain sensitive information. CVSS Base Score: 4.3 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/93367 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N) CVE-ID: CVE-2014-0099 Description: Apache Tomcat could allow a remote attacker to obtain sensitive information, caused by the failure to check for overflows when parsing content length headers. By sending specially-crafted request, an attacker could exploit this vulnerability to obtain sensitive information. CVSS Base Score: 5 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/93369 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N) CVE-ID: CVE-2014-0119 Description: Apache Tomcat could allow a remote attacker to obtain sensitive information, caused by the replacement of the XML parsers used to process XSLTs for the default servlet. An attacker could exploit this vulnerability using a specially-crafted application to obtain sensitive information. CVSS Base Score: 5 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/93368 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N) Affected Products and Versions TADDM 7.1.2, 7.2.0, 7.2.1 and 7.2.2 Remediation/Fixes There are eFixes prepared on top of latest released FixPack for each stream: Fix VRMF APAR How to acquire fix efix_tomcat7054_FP120131216.zip 7.2.2.1 None Download eFix efix_tomcat6041_FP620140416.zip 7.2.1.6 None Download eFix efix_tomcat_FP1020120928.zip 7.2.0.10 None Download eFix Note that the eFixes for TADDM 7.2.0.10 and 7.2.1.6 require manual modification of the etc/collation.properties file. Please get familiar with eFixes readme in etc/<efix_name>_readme.txt. Workarounds and Mitigations The only solution is to upgrade the Tomcat to 7.0.54 (in TADDM 7.2.2) or 6.0.41 (in TADDM 7.2.0 and 7.2.1). EFixes are prepared on top of latest FixPack release. If you need eFix for other TADDM version, please contact IBM Support. Open a PMR for a custom version of this eFix. Include your current eFix level, TADDM version and a link to this bulletin. References Complete CVSS Guide On-line Calculator V2 X-Force Vulnerability Database http://xforce.iss.net/xforce/xfdb/91426 http://xforce.iss.net/xforce/xfdb/91423 http://xforce.iss.net/xforce/xfdb/91625 http://xforce.iss.net/xforce/xfdb/91424 http://xforce.iss.net/xforce/xfdb/93365 http://xforce.iss.net/xforce/xfdb/93366 http://xforce.iss.net/xforce/xfdb/93367 http://xforce.iss.net/xforce/xfdb/93369 http://xforce.iss.net/xforce/xfdb/93368 Common Vulnerabilities and Exposures (CVE) http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4286 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0033 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4590 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0075 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0095 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0119 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Change History 31 July 2014: Original Copy Published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - ------------------------------------------------------------------------------- Security Bulletin: Tivoli Application Dependency Discovery Manager - Java Quarterly CPU - April 2014. Security Bulletin Document information More support for: Tivoli Application Dependency Discovery Manager Software version: 7.1.2, 7.2, 7.2.1, 7.2.2 Operating system(s): AIX, Linux, Solaris, Windows Reference #: 1678883 Modified date: 2014-07-30 Summary Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) according to alert published in "Summary advisory for Oracle April 2014 CPU Java", that can affect the security of IBM Tivoli Application Dependency Discovery Manager (TADDM). Vulnerability Details CVEID: CVE-2014-0457 DESCRIPTION: An unspecified vulnerability related to the Libraries component has complete confidentiality impact, complete integrity impact, and complete availability impact. CVSS Base Score: 10 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92460 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVEID: CVE-2014-2421 DESCRIPTION: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact. CVSS Base Score: 10 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92462 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVEID: CVE-2014-0429 DESCRIPTION: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact. CVSS Base Score: 10 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92459 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVEID: CVE-2014-0461 DESCRIPTION: An unspecified vulnerability related to the Libraries component has complete confidentiality impact, complete integrity impact, and complete availability impact. CVSS Base Score: 9.3 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92467 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVEID: CVE-2014-0455 DESCRIPTION: An unspecified vulnerability related to the Libraries component has complete confidentiality impact, complete integrity impact, and complete availability impact. CVSS Base Score: 9.3 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92466 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVEID: CVE-2014-2428 DESCRIPTION: An unspecified vulnerability related to the Deployment component has complete confidentiality impact, complete integrity impact, and complete availability impact. CVSS Base Score: 7.6 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92469 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:H/Au:N/C:C/I:C/A:C) CVEID: CVE-2014-0448 DESCRIPTION: An unspecified vulnerability related to the Deployment component has complete confidentiality impact, complete integrity impact, and complete availability impact. CVSS Base Score: 7.6 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92468 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:H/Au:N/C:C/I:C/A:C) CVEID: CVE-2014-0454 DESCRIPTION: An unspecified vulnerability related to the Security component has partial confidentiality impact, partial integrity impact, and partial availability impact. CVSS Base Score: 7.5 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92478 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-0446 DESCRIPTION: An unspecified vulnerability related to the Libraries component has partial confidentiality impact, partial integrity impact, and partial availability impact. CVSS Base Score: 7.5 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92477 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-0452 DESCRIPTION: An unspecified vulnerability related to the JAX-WS component has partial confidentiality impact, partial integrity impact, and partial availability impact. CVSS Base Score: 7.5 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92474 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-0451 DESCRIPTION: An unspecified vulnerability related to the AWT component has partial confidentiality impact, partial integrity impact, and partial availability impact. CVSS Base Score: 7.5 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92471 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-2402 DESCRIPTION: An unspecified vulnerability related to the Libraries component has partial confidentiality impact, partial integrity impact, and partial availability impact. CVSS Base Score: 7.5 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92476 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-2423 DESCRIPTION: An unspecified vulnerability related to the JAX-WS component has partial confidentiality impact, partial integrity impact, and partial availability impact. CVSS Base Score: 7.5 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92473 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-2427 DESCRIPTION: An unspecified vulnerability related to the Sound component has partial confidentiality impact, partial integrity impact, and partial availability impact. CVSS Base Score: 7.5 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92479 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-0458 DESCRIPTION: An unspecified vulnerability related to the JAX-WS component has partial confidentiality impact, partial integrity impact, and partial availability impact. CVSS Base Score: 7.5 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92472 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-2414 DESCRIPTION: An unspecified vulnerability related to the JAXB component has partial confidentiality impact, partial integrity impact, and partial availability impact. CVSS Base Score: 7.5 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92475 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-2412 DESCRIPTION: An unspecified vulnerability related to the AWT component has partial confidentiality impact, partial integrity impact, and partial availability impact. CVSS Base Score: 7.5 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92470 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVEID: CVE-2014-2409 DESCRIPTION: An unspecified vulnerability related to the Deployment component has partial confidentiality impact, partial integrity impact, and no availability impact. CVSS Base Score: 6.4 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92481 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:N) CVEID: CVE-2014-0460 DESCRIPTION: An unspecified vulnerability related to the JNDI component has partial confidentiality impact, partial integrity impact, and no availability impact. CVSS Base Score: 5.8 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92482 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N) CVEID: CVE-2013-6954 DESCRIPTION: A remote attacker could exploit this vulnerability using specially-crafted PNG image data to cause the application to crash. CVSS Base Score: 5 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/89917 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P) CVEID: CVE-2013-6629 DESCRIPTION: An attacker could exploit this vulnerability using specially crafted JPEG image data to read uninitialized memory and obtain sensitive information. CVSS Base Score: 5 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/88783 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N) CVEID: CVE-2014-2401 DESCRIPTION: An unspecified vulnerability related to the 2D component could allow a remote attacker to obtain sensitive information resulting in a partial confidentiality impact using unknown attack vectors. CVSS Base Score: 5 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92485 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N) CVEID: CVE-2014-0449 DESCRIPTION: An unspecified vulnerability related to the Deployment component could allow a remote attacker to obtain sensitive information resulting in a partial confidentiality impact using unknown attack vectors. CVSS Base Score: 5 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92483 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N) CVEID: CVE-2014-0459 DESCRIPTION: An unspecified vulnerability related to the 2D component could allow a remote attacker to cause a denial of service. CVSS Base Score: 4.3 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92488 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P) CVEID: CVE-2014-0453 DESCRIPTION: An unspecified vulnerability related to the Security component has partial confidentiality impact, partial integrity impact, and no availability impact. CVSS Base Score: 4 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92490 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N) CVEID: CVE-2014-2398 DESCRIPTION: An unspecified vulnerability related to the Javadoc component has no confidentiality impact, partial integrity impact, and no availability impact. CVSS Base Score: 3.5 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92491 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N) CVEID: CVE-2014-1876 DESCRIPTION: An unspecified vulnerability related to the Libraries component has no confidentiality impact, partial integrity impact, and partial availability impact. CVSS Base Score: 2.6 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92492 CVSS Environmental Score*: Undefined CVSS Vector: (AV:L/AC:H/Au:N/C:N/I:P/A:P) CVEID: CVE-2014-2420 DESCRIPTION: An unspecified vulnerability related to the Deployment component has no confidentiality impact, partial integrity impact, and no availability impact. CVSS Base Score: 2.6 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/92493 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:H/Au:N/C:N/I:P/A:N) CVEID: CVE-2014-0878 DESCRIPTION: A vulnerability in the IBMSecureRandom implementation of the IBMJCE and IBMSecureRandom cryptographic providers potentially allows an attacker to predict the output of the random number generator under certain circumstances. Please refer to the Workarounds & Mitigation section below for additional information. CVSS Base Score: 5.8 CVSS Temporal Score: http://xforce.iss.net/xforce/xfdb/91084 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N) Affected Products and Versions TADDM 7.1.2 and 7.2.0.0 through 7.2.1.6, TADDM 7.2.2.0 and 7.2.2.1 Remediation/Fixes For each TADDM release (7.2.0, 7.2.1 and 7.2.2) there are eFixes prepared on top of latest FixPack: Fix VRMF APAR How to acquire fix efix_jdk1.7_SR7_FP120131216.zip 7.2.2.1 None Download eFix efix_jdk1.5_SR16-FP6_FP620140416.zip 7.2.1.6 None Download eFix efix_jdk1.5_SR16-720FP10.zip 7.2.0.10 None Download eFix Please get familiar with eFix readme in etc/<efix_name>_readme.txt For each TADDM release (7.2.0, 7.2.1 and 7.2.2) there are prepared replacements for IBM 32-bit Runtime Environment for Windows Java Technology Edition shipped separately on TADDM installation DVD discs. Fix VRMF APAR How to acquire fix ibm-java-jre-70-win-i386 7.2.2.1 None Download fix ibm-java2-jre-50-win-i386 7.2.1.6 None Download fix and 7.2.0.10 Workarounds and Mitigations The only solution is to upgrade the JRE embedded with TADDM to IBM Java 2 Technology Edition Version 5 SR16-FP6 (in TADDM 7.2.0 and 7.2.1) and IBM Java Technology Edition Version 7 SR7 (in TADDM 7.2.2). EFixes are prepared to be installed only on top of TADDM 7.2.0.10, TADDM 7.2.1.6 and TADDM 7.2.2.1 respectively. If you need eFix for other TADDM version, please contact IBM Support. Open a PMR for a custom version of this eFix. Include your current eFix level, TADDM version and a link to this bulletin. JRE embedded in TADDM should not be used outside the product and never installed as system JRE. References Complete CVSS Guide On-line Calculator V2 IBM Java security alerts X-Force Vulnerability Database http://xforce.iss.net/xforce/xfdb/92460 http://xforce.iss.net/xforce/xfdb/92462 http://xforce.iss.net/xforce/xfdb/92459 http://xforce.iss.net/xforce/xfdb/92467 http://xforce.iss.net/xforce/xfdb/92466 http://xforce.iss.net/xforce/xfdb/92469 http://xforce.iss.net/xforce/xfdb/92468 http://xforce.iss.net/xforce/xfdb/92478 http://xforce.iss.net/xforce/xfdb/92477 http://xforce.iss.net/xforce/xfdb/92474 http://xforce.iss.net/xforce/xfdb/92471 http://xforce.iss.net/xforce/xfdb/92476 http://xforce.iss.net/xforce/xfdb/92473 http://xforce.iss.net/xforce/xfdb/92479 http://xforce.iss.net/xforce/xfdb/92472 http://xforce.iss.net/xforce/xfdb/92475 http://xforce.iss.net/xforce/xfdb/92470 http://xforce.iss.net/xforce/xfdb/92481 http://xforce.iss.net/xforce/xfdb/92482 http://xforce.iss.net/xforce/xfdb/89917 http://xforce.iss.net/xforce/xfdb/88783 http://xforce.iss.net/xforce/xfdb/92485 http://xforce.iss.net/xforce/xfdb/92483 http://xforce.iss.net/xforce/xfdb/92488 http://xforce.iss.net/xforce/xfdb/92490 http://xforce.iss.net/xforce/xfdb/92491 http://xforce.iss.net/xforce/xfdb/92492 http://xforce.iss.net/xforce/xfdb/92493 http://xforce.iss.net/xforce/xfdb/91084 Common Vulnerabilities and Exposures (CVE) http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0455 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2428 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0448 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0454 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2402 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2409 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2401 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0449 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2420 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0878 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Change History 31 July 2014: Original Copy Published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBU+A86hLndAQH1ShLAQKykQ/7BOQdNrfki2m2gm0KTEIIqLXiT8fhBtWO 6l0h8hG7IrzR5/u0dSDtqQmXtVvj31Z9jnBV02JYY3MbsdSqDZZXtPFT8fYGfU7T xwp+t2DQZxxjPeQGCMtOMQTC/8JNeOyrRzg8wo8LUtrQwCSaYOzYSZU2i1d+MIUK C1ihVDDcMb/TO4RCg4UsknfjBV5BDQk5/cb4naLa7qhmxD6kW3IP1JU06dVzPz1L 4aWnmJFFQvCOEbjryfQAETb6+vgiiPoqzJzToRnkv/vGoCqMTxQwmgUxefkIlqBg jwRF4RbRQSfndDggs4XYCybiNe4Bf7+X+vNEe3h8wR5d4vwv1xQQQcUD3+u3IxMV k/g/CjPpIbdIDMSA1/sweSH3mk4aDO6QCyWF8ss/DyVMMDNLE08nVlXb1Wwth2ql Xv9MN09HaghRVE4BA839z7wm6OObRWHQ1qTtJzrbz3GQqAhKDhDeI4wH+AeBDleU +SCQksvigGG8n1IouSnTtgQqMjaWCcNC8jIF5R7xJnqjZOzpwDxGT+JwqAj09Jbp zevakJcudbQ80GcK8iVN7Qjp1SNGxJFGiW5KfYsgAS3XkrXpHku5kg5g5YV5Slxd s7t8PRAan4Dsn/a+ngl6DE49xSlgq8ak7HbfMA8vzMXhkQ+i04umNXq/MYwrDFbt kzBIbVhMNK4= =0IbW -----END PGP SIGNATURE-----