-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.1722
   IBM PureApplication System - Action required for Bash vulnerabilities
       (CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187,
                     CVE-2014-6277, and CVE-2014-6278)
                              1 October 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM PureApplication System
Publisher:         IBM
Operating System:  Red Hat
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-7187 CVE-2014-7186 CVE-2014-7169
                   CVE-2014-6278 CVE-2014-6277 CVE-2014-6271

Reference:         ASB-2014.0111
                   ASB-2014.0110
                   ESB-2014.1709
                   ESB-2014.1699
                   ESB-2014.1680

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21685833

- --------------------------BEGIN INCLUDED TEXT--------------------

IBM PureApplication System - Action required for Bash vulnerabilities 
(CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, 
and CVE-2014-6278)

Document information

More support for:

PureApplication System

Security

Software version:

1.0, 1.0.0.1, 1.0.0.2, 1.0.0.3, 1.0.0.4, 1.1.0.0, 1.1.0.1, 1.1.0.2, 1.1.0.3, 
1.1.0.4, 2.0

Operating system(s):

Linux Red Hat - xSeries

Reference #:

1685833

Modified date:

2014-09-30

Flash (Alert)

Abstract

IBM PureApplication System requires customer action for the Bash 
vulnerabilities that have been referred to as Bash Bug or Shellshock and the 
two memory corruption vulnerabilities.

Content

VULNERABILITY DETAILS:

DESCRIPTION:

IBM PureApplication System provides the ability to deploy Red Hat Enterprise 
Linux virtual machines that are vulnerable to the following Bash 
vulnerabilities: CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, 
CVE-2014-6277, and CVE-2014-6278.

REMEDIATION:

IBM strongly recommends that you contact Red Hat to obtain fixes and install 
fixes for Red Hat Enterprise Linux.

REFERENCES:

Complete CVSS Guide (http://www.first.org/cvss/cvss-guide.html)

On-line Calculator V2 (http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2)

RELATED INFORMATION:

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

ACKNOWLEDGEMENT:

None

CHANGE HISTORY:

30 September 2014 - Original Copy Published

Note: According to the Forum of Incident Response and Security Teams (FIRST),
the Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=dN/i
-----END PGP SIGNATURE-----