-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.1731
   IBM Smart Analytics System 5600 is affected by the following OpenSSL
       vulnerabilities: CVE-2014-0076, CVE-2014-0224, CVE-2014-0221
                             and CVE-2014-3470
                              1 October 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Smart Analytics System 5600
Publisher:         IBM
Operating System:  Linux variants
Impact/Access:     Access Privileged Data         -- Remote/Unauthenticated
                   Denial of Service              -- Remote/Unauthenticated
                   Provide Misleading Information -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-3470 CVE-2014-0224 CVE-2014-0221
                   CVE-2014-0076  

Reference:         ASB-2014.0092
                   ESB-2014.1617
                   ESB-2014.1527
                   ASB-2014.0069.2

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21682026

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: IBM Smart Analytics System 5600 is affected by the 
following OpenSSL vulnerabilities: CVE-2014-0076, CVE-2014-0224, CVE-2014-0221
and CVE-2014-3470

More support for:

IBM Smart Analytics System

IBM Smart Analytics System 5600

Software version:

9.7, 10.1

Operating system(s):

Linux

Reference #:

1682026

Modified date:

2014-09-30

Security Bulletin

Summary

Security vulnerabilities have been discovered in OpenSSL that were reported on
June 5, 2014 by the OpenSSL Project.

Vulnerability Details

CVE-ID: CVE-2014-0076

DESCRIPTION: OpenSSL could allow a local attacker to obtain sensitive 
information, caused by an implementation error in ECDSA (Elliptic Curve 
Digital Signature Algorithm). An attacker could exploit this vulnerability 
using the FLUSH+RELOAD cache side-channel attack to recover ECDSA nonces.

CVSS Base Score: 2.1

CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/91990 for the 
current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:N/A:N)

CVE-ID: CVE-2014-0224

DESCRIPTION: OpenSSL is vulnerable to a man-in-the-middle attack, caused by 
the use of weak keying material in SSL/TLS clients and servers. A remote 
attacker could exploit this vulnerability using a specially-crafted handshake
to conduct man-in-the-middle attacks to decrypt and modify traffic.

CVSS Base Score: 5.8

CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93586 for the 
current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)

CVE-ID: CVE-2014-0221

DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by a 
recursion error in the DTLS client. By sending an invalid DTLS handshake, a 
remote attacker could exploit this vulnerability to cause the application to 
crash.

CVSS Base Score: 4.3

CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93587 for the 
current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-ID: CVE-2014-3470

DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by the 
implementation of anonymous ECDH ciphersuites. A remote attacker could exploit
this vulnerability to cause a denial of service.

CVSS Base Score: 4.3

CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93589 for the 
current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)

Affected Products and Versions

IBM Smart Analytics System 5600 V1

IBM Smart Analytics System 5600 V2

IBM Smart Analytics System 5600 V3

Remediation/Fixes

For each affected component in the table, download the recommended fix, and 
install using the link in the Installation instructions column.

For more information about IBM IDs, see the Help and FAQ.


IBM Smart Analytics System 5600 V1

Affected Component 		Recommended Fix 			Download Link 						Installation instructions

SUSE Linux Enterprise Server 11 Update OpenSSL to 0.9.8j-0.58.1 	Novell: Patch 9324 					Updating OpenSSL in an IBM InfoSphere 
																Balanced Warehouse, an IBM Smart Analytics 
																System, or an IBM PureData System for 
																Operational Analytics environment

IBM System x3650 M2 		Update IMM to 1.44 			IBM Fix Central: IMM 1.44 				Updating the IBM System x IMM, UEFI, or 
																DSA - Preboot Embedded in an IBM InfoSphere 
																Balanced Warehouse or IBM Smart Analytics 
																System environment

IBM Advanced Settings Utility 	Update ASU to 9.61 			IBM Fix Central: ASU 9.61 				Updating the IBM UpdateXpress System Pack 
																Installer, Advanced Settings Utility and 
																Dynamic System Analysis in an IBM Smart 
																Analytics System 5600 environment

IBM Dynamic System Analysis 	Update DSA to 9.61 			IBM Fix Central: DSA 9.61 				Updating the IBM UpdateXpress System Pack 
																Installer, Advanced Settings Utility and 
																Dynamic System Analysis in an IBM Smart 
																Analytics System 5600 environment

IBM UpdateXpress System Pack  	Update UX to 9.61 			IBM Fix Central: UX 9.61 				Updating the IBM UpdateXpress System Pack
Installer															Installer, Advanced Settings Utility and 
																Dynamic System Analysis in an IBM Smart 
																Analytics System 5600 environment

IBM Systems Director and 	Install IBM Systems Director and 	IBM Fix Central: 					Installing IBM Systems Director software 
IBM Systems Director Platform 	IBM Systems Director Platform Agent 	SysDir6_2_x_0_6_3_x_0_IT02562_IT02549_IT02551_IT02560	updates on the IBM Smart Analytics System 
Agent 6.3.2.1			APAR IT02562												5600 V1
   		


IBM Smart Analytics System 5600 V2

Affected Component 		Recommended Fix 			Download Link 						Installation instructions

SUSE Linux Enterprise 		Update OpenSSL to 0.9.8j-0.58.1 	Novell: Patch 9324 					Updating OpenSSL in an IBM InfoSphere 
 Server 11															Balanced Warehouse, an IBM Smart Analytics 
																System, or an IBM PureData System for 
																Operational Analytics environment

IBM System x3650 M3 		Update IMM to 1.44 			IBM Fix Central: IMM 1.44 				Updating the IBM System x IMM, UEFI, or 
																DSA - Preboot Embedded in an IBM InfoSphere 								
																Balanced Warehouse or IBM Smart Analytics			
																System environment

IBM Advanced Settings Utility 	Update ASU to 9.61 			IBM Fix Central: ASU 9.61 				Updating the IBM UpdateXpress System Pack 
																Installer, Advanced Settings Utility and Dynamic 
																System Analysis in an IBM Smart Analytics System 
																5600 environment

IBM Dynamic System Analysis 	Update DSA 				IBM Fix Central: DSA 9.61 				Updating the IBM UpdateXpress System Pack 
																Installer, Advanced Settings Utility and Dynamic
																System Analysis in an IBM Smart Analytics System 
																5600 environment

IBM UpdateXpress System Pack 	Update UX to 9.61 			IBM Fix Central: UX 9.61 				Updating the IBM UpdateXpress System Pack Installer,
Installer															Advanced Settings Utility and Dynamic System 							
																Analysis in an IBM Smart Analytics System 5600 
																environment

IBM Systems Director and IBM 	Install IBM Systems Director and  	IBM Fix Central:  					InstallingIBM Systems Director software updates on 
Agent 6.3.2.1 			IBM Systems Director Platform Agent	SysDir6_2_x_0_6_3_x_0_IT02562_IT02549_IT02551_IT02560	the IBM Smart Analytics System 5600 V2
Systems Director Platform  	APAR IT02562	

IBM J48E and Juniper 		Contact IBM Support
EX4500 Switch


IBM Smart Analytics System 5600 V3

Affected Component 		Recommended Fix 			Download Link 						Installation instructions

SUSE Linux Enterprise 		Contact IBM Support
Server 11

IBM System x3650 M4 		Update IMM2 to 4.31 			IBM Fix Central: IMM 4.31 				Updating the IBM System x IMM, UEFI, or DSA - 
																Preboot Embedded in an IBM InfoSphere Balanced 
																Warehouse or IBM Smart Analytics System environment

				Update DSA Preboot Embedded to 9.54 	IBM Fix Central: DSA Preboot Embedded 9.54		Updating the IBM System x IMM, UEFI, or DSA - 
																Preboot Embedded in an IBM InfoSphere Balanced 								 
																Warehouse or IBM Smart Analytics System environment
IBM Advanced Settings Utility 	Contact IBM Support

IBM Dynamic System Analysis 	Contact IBM Support

IBM UpdateXpress System Pack 	Contact IBM Support
Installer

IBM Systems Director  		Contact IBM Support
and IBM Systems Director 
Platform Agent 6.3.2.1

IBM J48E and Juniper 		Contact IBM Support
EX4500 Switch 

Contact IBM Support:

In the United States and Canada dial 1-800-IBM-SERV

View the support contacts for other countries outside of the United States.

Electronically open a Service Request with IBM Support.

Workarounds and Mitigations

None known

References

Complete CVSS Guide

On-line Calculator V2

OpenSSL Project vulnerability website

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

Change History

September 30, 2014: Original version published.

*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the 
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the 
Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=QB7t
-----END PGP SIGNATURE-----