-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.1565
          Two vulnerabilities in FileNet Content Manager and IBM
           Content Foundation (CVE-2014-0453 and CVE-2014-0878)
                             11 September 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM FileNet Content Manager
                   IBM Content Foundation
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   Linux variants
                   Solaris
                   Windows
Impact/Access:     Modify Arbitrary Files   -- Remote/Unauthenticated
                   Access Confidential Data -- Remote/Unauthenticated
                   Reduced Security         -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-0878 CVE-2014-0453 

Reference:         ASB-2014.0063
                   ESB-2014.1477
                   ESB-2014.1401
                   ESB-2014.1307
                   ESB-2014.1301
                   ESB-2014.1278

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21674132

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Two vulnerabilities in FileNet Content Manager and IBM 
Content Foundation (CVE-2014-0453 and CVE-2014-0878)

Document information

More support for:
FileNet Content Manager
Content Search Services

Software version:
5.1.0, 5.2.0

Operating system(s):
AIX, HP-UX, Linux, Solaris, Windows

Reference #:
1674132

Modified date:
2014-09-10

Security Bulletin

Summary

Two Security vulnerabilities exist in FileNet Content Manager and IBM Content
Foundation. See the individual descriptions for details.

Vulnerability Details

VULNERABILITY DETAILS:

CVEID: CVE-2014-0453

DESCRIPTION:

An Exception thrown by the Security component reveals information that an 
attacker

could use to break RSA keys via a Bleichenbacher attack.

The fix removes the sensitive information from the Exception message.

CVSS Base Score: 4

CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/92490 for the 
current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N)

CVEID: CVE-2014-0878

DESCRIPTION:

A flaw exists in the seeding mechanism for the IBMSecureRandom implementation
of the IBMJCE and IBMSecureRandom cryptographic providers. As a result, it may
be possible for an attacker to predict the output of the random number 
generator under certain circumstances.

The IBMSecureRandom implementation in the FIPS 140-2 IBMJCEFIPS cryptographic
provider is not vulnerable. The alternative secure random number generators in
the IBMJCE, IBMJCEFIPS and IBMSecureRandom cryptographic providers are also 
not vulnerable.

CVSS Base Score: 5.8

CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/91084 for the 
current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)

*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the 
Reference section of this Flash.

Note: According to the Forum of Incident Response and Security Teams (FIRST),
the Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Affected Products and Versions

IBM FileNet Content Manager 5.1.0 and 5.2.x

IBM Content Foundation 5.2.x

Remediation/Fixes

Apply the following fixes:

Product 		      VRMF 			Remediation/First Fix

FileNet Content Manager 5.1   (5.1.0.0-P8CSS-IF009) 	eGA July 21, 2014

FileNet Content Manager 5.1   (5.1.0.4-P8CE-IF002) 	eGA July 21, 2014

FileNet Content Manager 5.2   (5.2.0.2-P8CSS-FP002) 	eGA September 5, 2014

FileNet Content Manager 5.2   (5.2.0.3-P8CPE-IF003) 	eGA September 5, 2014

IBM Content Foundation 	5.2   (5.2.0.2-P8CPE-IF003)	eGA September 5, 2014

Workarounds and Mitigations

Test fixes will be made available upon request to any affected customer who is
not able to update to the fix pack levels that contain the fix.

Important note: IBM strongly suggests that all System z customers be 
subscribed to the System z Security Portal to receive the latest critical 
System z security and integrity service. If you are not subscribed, see the 
instructions on the System z Security web site. Security and integrity APARs 
and associated fixes will be posted to this portal. IBM suggests reviewing the
CVSS scores and applying all security or integrity fixes as soon as possible 
to minimize any potential risk.

Important note

IBM strongly suggests that all System z customers be subscribed to the System
z Security Portal to receive the latest critical System z security and 
integrity service. If you are not subscribed, see the instructions on the 
System z Security web site. Security and integrity APARs and associated fixes
will be posted to this portal. IBM suggests reviewing the CVSS scores and 
applying all security or integrity fixes as soon as possible to minimize any 
potential risk.


References

Complete CVSS Guide

On-line Calculator V2

- - Complete CVSS Guide

- - On-line Calculator V2


Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

IBM Secure Engineering Web Portal


Acknowledgement

None


Change History

<> June 2014: Original version published

*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the 
Reference section of this Security Bulletin.


Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the 
Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Owmb
-----END PGP SIGNATURE-----