Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2014.1565 Two vulnerabilities in FileNet Content Manager and IBM Content Foundation (CVE-2014-0453 and CVE-2014-0878) 11 September 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM FileNet Content Manager IBM Content Foundation Publisher: IBM Operating System: AIX HP-UX Linux variants Solaris Windows Impact/Access: Modify Arbitrary Files -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Reduced Security -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2014-0878 CVE-2014-0453 Reference: ASB-2014.0063 ESB-2014.1477 ESB-2014.1401 ESB-2014.1307 ESB-2014.1301 ESB-2014.1278 Original Bulletin: http://www-01.ibm.com/support/docview.wss?uid=swg21674132 - --------------------------BEGIN INCLUDED TEXT-------------------- Security Bulletin: Two vulnerabilities in FileNet Content Manager and IBM Content Foundation (CVE-2014-0453 and CVE-2014-0878) Document information More support for: FileNet Content Manager Content Search Services Software version: 5.1.0, 5.2.0 Operating system(s): AIX, HP-UX, Linux, Solaris, Windows Reference #: 1674132 Modified date: 2014-09-10 Security Bulletin Summary Two Security vulnerabilities exist in FileNet Content Manager and IBM Content Foundation. See the individual descriptions for details. Vulnerability Details VULNERABILITY DETAILS: CVEID: CVE-2014-0453 DESCRIPTION: An Exception thrown by the Security component reveals information that an attacker could use to break RSA keys via a Bleichenbacher attack. The fix removes the sensitive information from the Exception message. CVSS Base Score: 4 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/92490 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N) CVEID: CVE-2014-0878 DESCRIPTION: A flaw exists in the seeding mechanism for the IBMSecureRandom implementation of the IBMJCE and IBMSecureRandom cryptographic providers. As a result, it may be possible for an attacker to predict the output of the random number generator under certain circumstances. The IBMSecureRandom implementation in the FIPS 140-2 IBMJCEFIPS cryptographic provider is not vulnerable. The alternative secure random number generators in the IBMJCE, IBMJCEFIPS and IBMSecureRandom cryptographic providers are also not vulnerable. CVSS Base Score: 5.8 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/91084 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N) *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. Affected Products and Versions IBM FileNet Content Manager 5.1.0 and 5.2.x IBM Content Foundation 5.2.x Remediation/Fixes Apply the following fixes: Product VRMF Remediation/First Fix FileNet Content Manager 5.1 (5.1.0.0-P8CSS-IF009) eGA July 21, 2014 FileNet Content Manager 5.1 (5.1.0.4-P8CE-IF002) eGA July 21, 2014 FileNet Content Manager 5.2 (5.2.0.2-P8CSS-FP002) eGA September 5, 2014 FileNet Content Manager 5.2 (5.2.0.3-P8CPE-IF003) eGA September 5, 2014 IBM Content Foundation 5.2 (5.2.0.2-P8CPE-IF003) eGA September 5, 2014 Workarounds and Mitigations Test fixes will be made available upon request to any affected customer who is not able to update to the fix pack levels that contain the fix. Important note: IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk. Important note IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk. References Complete CVSS Guide On-line Calculator V2 - - Complete CVSS Guide - - On-line Calculator V2 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog IBM Secure Engineering Web Portal Acknowledgement None Change History <> June 2014: Original version published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVBEpEBLndAQH1ShLAQKlXA//VrOJBrESh7tL76wZUo2IJiU/OgLDxroe xoctf5WHK9Jz9HEXvXrVPrhVsUkRFylrJNfpGZYYhaq8L3s03MbbIhCCs5AFdUDO Wu3Q3QLU2/8e+g6q+YA3dfeK+8fLs/t71b55i0XsldwSOiPkqRPYCJ3X1x7oZIJR pXKDmau7udw8CfQ/TI7ZlDyRkBwB9/nkEfmlZC2VvmPv6RVCbzfxucGNOHHYG/iU hOIphKiGDBJZBhNzscLlVKJK/cC/nNkhFKMMCax9i3YOgopZzZ52zboK7+xM9V15 prW47klHDgE0ZiodjIJVr8SfcvDbC0DGtNZr3vXRz1a+XZBsj/QjMUWj9Yi0PIz+ 4lrsDJC8KpMpr+5yxEXn0JHSChICmQOIQrICHrB0Q49//5D3Iw4Ic+o+tkYw4wxa Lgw9voXljRWy0nk8jmshGhPjyAbmysHnTe3BSNQ7wdue638oIPagSRbdfStcMxIU RccZ72opPs5qIUCl28JxtqSJxm1PkYAX0uLYPc+HazC/2JL3XDJB5Zzyyk7jQelV V9HkPQDSxahvSL93zWiI0CNyzpmUgEgCMZxhuW5POukPkIGfe0l4OxYDsPQx53HP xgc/v/bxmToI96EAprmPo7R1v3T5Xwk5JdfGTH+FqtgSFsr4YnTWUYVtxTDI8hC4 XDwaMhXqnos= =Owmb -----END PGP SIGNATURE-----