-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.1362
  Security Bulletin: The Enterprise Common Collector (a component of IBM
 Tivoli zEnterpise Monitoring Agent, a component of IBM Tivoli Monitoring)
         is potentially affected by multiple vulnerabilities that
           have been identified in IBM Runtime Environment, Jav
                              11 August 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Tivoli Monitoring
Publisher:         IBM
Operating System:  AIX
                   Linux variants
                   Windows
Impact/Access:     Modify Arbitrary Files   -- Remote/Unauthenticated
                   Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-0453 CVE-2014-0411 

Reference:         ASB-2014.0063
                   ASB-2014.0053
                   ASB-2014.0005
                   ESB-2014.0114
                   ESB-2014.0102
                   ESB-2014.0065
                   ESB-2014.0058

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21680387

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: The Enterprise Common Collector (a component of IBM
Tivoli zEnterpise Monitoring Agent, a component of IBM Tivoli Monitoring)
is potentially affected by multiple vulnerabilities that have been identified
in IBM Runtime Environment, Jav

Document information

More support for:
Tivoli Monitoring Version 6
Enterprise Common Collector V1.1.0

Software version:
6.2.3.1, 6.2.3.2, 6.2.3.3, 6.2.3.4, 6.2.3.5, 6.3

Operating system(s):
AIX, Linux, Windows

Reference #:
1680387

Modified date:
2014-08-04

Security Bulletin

Summary

Vulnerabilities have been identified in IBM Runtime Environment, Java
Technology Edition, Version 6, utilized by The Enterprise Common Collector
(a component of IBM Tivoli zEnterpise Monitoring Agent, a component of
IBM Tivoli Monitoring).

Vulnerability Details

CVEID: CVE-2014-0411
DESCRIPTION:
An unspecified vulnerability related to the JSSE component has partial
confidentiality impact, partial integrity impact, and no availability impact.

CVSS Base Score: 4.0
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/90357 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N)

CVEID: CVE-2014-0453
DESCRIPTION:
An unspecified vulnerability related to the Security component has partial
confidentiality impact, partial integrity impact, and no availability impact.

CVSS Base Score: 4.0
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/92490 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N)

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Affected Products and Versions

Enterprise Common Collector 1.1.0 (a component of IBM Tivoli zEnterpise
Monitoring Agent, a component of IBM Tivoli Monitoring v6.2.3 and v6.3.0).

Remediation/Fixes

Product IBM Tivoli zEnterpise Monitoring Agent (Enterprise Common Collector
	v1.1.0 component)

VRMF	v6.2.3

Operating System	Remediation/First Fix

AIX			Fix Central link
Linux on z		Fix Central link
Linux on Intel 32-bit	Fix Central link
Linux on Intel 64-bit	Fix Central link
32-bit Windows		Fix Central link
64-bit Windows		Fix Central link

Note: IBM Tivoli zEnterprise Monitoring Agent v6.2.3 is a component of
ITM v6.2.3 and v6.3.0.

Workarounds and Mitigations

The currently supported fixpack of the Enterprise Common Collector (ECC)
v1.1.0 is fixpack 2 (also known as v1.1.0.2). If you have a back level
fixpack of the Enterprise Common Collector (v1.1.0.0 or v1.1.0.1), please
upgrade to version 1.1.0.2 (which can be found on Passport Advantage -
part # CIN10ML).

References
Complete CVSS Guide
On-line Calculator V2

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowledgement

None

Change History

4 August 2014: Original Copy Published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Rzf6
-----END PGP SIGNATURE-----