-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.2178
  Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM
                Support Assistant Team Server July 2014 CPU
                             19 November 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Support Assistant
Publisher:         IBM
Operating System:  AIX
                   Linux variants
                   Windows
Impact/Access:     Modify Arbitrary Files   -- Remote/Unauthenticated
                   Access Privileged Data   -- Existing Account      
                   Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-4263 CVE-2014-4244 CVE-2014-3068

Reference:         ASB-2014.0077

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21681371

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM
Support Assistant Team Server July 2014 CPU

Document information

More support for:
IBM Support Assistant

Software version:
5.0, 5.0.1

Operating system(s):
AIX, Linux, Windows

Software edition:
TeamServer

Reference #:
1681371

Modified date:
2014-11-17

Security Bulletin

Summary

There are multiple vulnerabilities in IBM SDK Java Technology Edition
that is shipped with IBM Support Assistant Team Server. These issues were
disclosed as part of the IBM Java SDK updates in July 2014.

Vulnerability Details

The following two advisories are included in the IBM SDK Java Technology
Edition and IBM Support Assistant Team Server may be vulnerable to them.
CVEID: CVE-2014-4263
DESCRIPTION: An unspecified vulnerability related to the security
component has partial confidentiality impact, partial integrity impact
and no availability impact.
CVSS Base Score: 4.0
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/94606 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N)

CVEID: CVE-2014-4244
DESCRIPTION: An unspecified vulnerability related to the security
component has partial confidentiality impact, partial integrity impact
and no availability impact.
CVSS Base Score: 4.0
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/94605 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N)

CVEID: CVE-2014-3068
DESCRIPTION: A vulnerability in the Java Certificate Management System (CMS)
keystore provider potentially allows brute-force private key recovery from
CMS keystores.
CVSS Base Score: 2.4
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93756 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:L/AC:H/Au:S/C:P/I:P/A:N)

The following advisories are included in the IBM Java SDK but IBM Support
Assistant Team Server is not vulnerable to them. Please refer to the
Reference section for more information on the advisories not applicable
to IBM Support Assistant Team Server:
CVE IDs:
CVE-2014-4227
CVE-2014-4262
CVE-2014-4216
CVE-2014-2490
CVE-2014-4223
CVE-2014-4219
CVE-2014-2483
CVE-2014-4209
CVE-2014-4220
CVE-2014-4268
CVE-2014-4218
CVE-2014-4252
CVE-2014-4252
CVE-2014-4266
CVE-2014-4262
CVE-2014-4265
CVE-2014-4221
CVE-2014-4208

Affected Products and Versions

IBM Java SDK shipped with IBM Support Assistant Team Server versions 5.0.0
and 5.0.1.

Remediation/Fixes

For V5.0.0 through 5.0.1:

    Update to IBM Support Assistant Team Server 5.0.1.1.

References
Complete CVSS Guide
On-line Calculator V2

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

12 November 2014: Original Version Published
14 November 2014: Adding CVE-2014-3068 to list of potential vulnerabilities

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Cross reference information

Segment			Product
Application Servers	Runtimes for Java Technology

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=85Zu
-----END PGP SIGNATURE-----