-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.2173
Security Bulletin: AppScan Standard can be affected by vulnerability in the
  current IBM SDK for Java (CVE-2014-0878, CVE-2014-4244, CVE-2014-4263)
                             19 November 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Security AppScan Standard
Publisher:         IBM
Operating System:  Windows
Impact/Access:     Modify Arbitrary Files   -- Remote/Unauthenticated
                   Access Confidential Data -- Remote/Unauthenticated
                   Reduced Security         -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-4263 CVE-2014-4244 CVE-2014-0878

Reference:         ASB-2014.0077
                   ESB-2014.1070
                   ESB-2014.0975
                   ESB-2014.0966
                   ESB-2014.0707

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21689593

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: AppScan Standard can be affected by vulnerability in
the current IBM SDK for Java (CVE-2014-0878, CVE-2014-4244, CVE-2014-4263)

Document information

More support for:
IBM Security AppScan Standard

Software version:
8.0, 8.5, 8.6.0.0, 8.7, 8.8, 9.0, 9.0.1

Operating system(s):
Windows

Reference #:
1689593

Modified date:
2014-11-13

Security Bulletin

Summary

A security vulnerability exists in the IBM SDK for Java that is shipped
with IBM Security AppScan Standard. The Java version will be updated to
IBM(R) Runtime Environment, Java(TM) Technology Edition, Version 7 Release 1

Vulnerability Details

CVEID: CVE-2014-0878

DESCRIPTION: A vulnerability in the IBMSecureRandom implementation of the
IBMJCE and IBMSecureRandom cryptographic providers potentially allows
an attacker to predict the output of the random number generator under
certain circumstances. This vulnerability only affects the GSC (Generic
Services Client) used to scan WSDL based web-services.

CVSS Base Score: 5.8
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/91084 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)

CVEID: CVE-2014-4263

DESCRIPTION: An unspecified vulnerability related to the Security component
has partial confidentiality impact, partial integrity impact, and no
availability impact.

CVSS Base Score: 4
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/94606 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N)

CVEID: CVE-2014-4244

DESCRIPTION: An unspecified vulnerability related to the Security component
has partial confidentiality impact, partial integrity impact, and no
availability impact.

CVSS Base Score: 4
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/94605 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N)

Affected Products and Versions

IBM Security AppScan Standard – 9.0.1, 9.0, 8.8, 8.7, 8.6, 8.5, 8.0

Remediation/Fixes

Product				VRMF		Remediation/First Fix
IBM Security AppScan Standard	9.0.1.0		Download IBM Security
						AppScan Standard 9.0.1

IBM Security AppScan Standard	8.0.x.x		Download the following zip 
				8.5.x.x		file from FixCentral(
				8.6.x.x		RASS-Windows-JavaFix).
				8.7.x.x
				8.8.x.x
				9.0.0.x		
						
						

    1) Ensure that all instances of AppScan are closed.
    2) Go to the AppScan Standard installation folder and select the
    Java folder.
    3) Unzip the content of the zip file into the Java folder.
    4) There is a known issue that certain files under the jre\lib\fonts
    are held by certain system processes. If these files fail to copy,
    simply skip the copying, the upgrade will be successful without them.
    5) If there are errors in copying that are not related to the fonts
    folder then restart the computer and try copying again.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References
Complete CVSS Guide
On-line Calculator V2

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVGwFKxLndAQH1ShLAQKuSQ/+PybXmUUnBx8VeBVcOc2VB9YRGR3orD9C
uCwukABJ5feWVrLw6U42oP8ZjL9GB1MJsBfxovadObMe1+VxySpLNUb82tJeP5DM
K+YsV4SXrs6PxFLho4j+xsBb/xnuEzD4K/51CURK5wLRH8DESJ4JN+hZtGooa2wq
t2l/AMTr/rONl4HMLPbmWNLqqOD+P1XGwlnwkE7n3zke7IpULwaDjrup3N2ndSN/
T7NKS5YknKiP4/mxg2oe3EJFtwqDYn8rUVHMApYMQtuX73C4Xq/nGVS15dCY5U1l
w9g95U1wlYhv2VhB37PJWxCLhzhdqUF3PMGHSQ7+vzDSHX5hQ5bqCF+sARlner8g
QDFwm0BVZjNyo7i+0ffzZoJeNuomW4w54ktrRDMQAnWnRIGHS8TsdP0m3X9tlda+
LlCk/0xOzAVc9bHTQkWx/Ic/kQOXAzI+86RKuLk5xwOV8Tw6q84TUa5/+V4Tmm6W
ya8BhnaTYc/TFsCvLYWbjAbTbUwN+Q0Jdlh1FNsJtEiRTcCT9AnPXIY1L/3u+7zT
3+Lekn0q/G7+Vqi4T7Aj3haTmWIWuqZFdYq/8KCH/5d6xm2VSaMaZwdsHFdBStLU
vjv1qAjxq/XsDgwwDVltbgeOs/VKB2S11AprixWr6ZaLej7lZZ18p5wOphlcoAsn
+N5y5dS0XI0=
=AApk
-----END PGP SIGNATURE-----