-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.1368
    Security Bulletin: Vulnerabilities in OpenSSL affect IBM InfoSphere
Information Server (CVE-2015-0204 CVE-2014-8275 CVE-2014-3570 CVE-2015-0286
         CVE-2015-0292 CVE-2015-0293 CVE-2015-0209 CVE-2015-0288)
                                22 May 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM InfoSphere Information Server
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   Linux variants
                   Solaris
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Access Privileged Data          -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Provide Misleading Information  -- Remote/Unauthenticated
                   Reduced Security                -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-0293 CVE-2015-0292 CVE-2015-0288
                   CVE-2015-0286 CVE-2015-0209 CVE-2015-0204
                   CVE-2014-8275 CVE-2014-3570 

Reference:         ESB-2015.1345
                   ESB-2015.0678
                   ESB-2015.0318
                   ESB-2015.0048.2

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=swg21902277

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Vulnerabilities in OpenSSL affect IBM InfoSphere 
Information Server (CVE-2015-0204 CVE-2014-8275 CVE-2014-3570 CVE-2015-0286 
CVE-2015-0292 CVE-2015-0293 CVE-2015-0209 CVE-2015-0288)

Security Bulletin

Document information

More support for:

InfoSphere Information Server

Software version:

8.5, 8.7, 9.1, 11.3

Operating system(s):

AIX, HP-UX, Linux, Solaris, Windows

Reference #:

1902277

Modified date:

2015-05-21

Summary

OpenSSL vulnerabilities were disclosed on January 8, 2015 and March 19, 2015 
by the OpenSSL Project. This includes FREAK: Factoring Attack on RSA-EXPORT 
keys" TLS/SSL client and server vulnerability. OpenSSL is used by IBM 
InfoSphere Information Server. IBM InfoSphere Information Server has addressed
the applicable CVEs.

Vulnerability Details

CVEID: CVE-2015-0204
DESCRIPTION: A vulnerability in the OpenSSL ssl3_get_key_exchange function 
could allow a remote attacker to downgrade the security of certain TLS 
connections. An OpenSSL client accepts the use of an RSA temporary key in a 
non-export RSA key exchange ciphersuite. This could allow a remote attacker 
using man-in-the-middle techniques to facilitate brute-force decryption of 
TLS/SSL traffic between vulnerable clients and servers.

This vulnerability is also known as the FREAK attack.

CVSS Base Score: 4.3
CVSS Temporal Score: See 
http://exchange.xforce.ibmcloud.com/#/vulnerabilities/99707 for the current 
score CVSS Environmental Score*: Undefined CVSS Vector: 
(AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVEID: CVE-2014-3570
DESCRIPTION: An unspecified error in OpenSSL related to the production of 
incorrect results on some platforms by Bignum squaring (BN_sqr) has an unknown
attack vector and impact. CVSS Base Score: 2.6 CVSS Temporal Score: See 
http://exchange.xforce.ibmcloud.com/#/vulnerabilities/99710 or the current 
score CVSS Environmental Score*: Undefined CVSS Vector: 
(AV:N/AC:H/Au:N/C:N/I:P/A:N)

CVEID: CVE-2014-8275
DESCRIPTION: OpenSSL could allow a local attacker to bypass security 
restrictions, caused by the modification of the fingerprint without breaking 
the signature. An attacker could exploit this vulnerability using non-DER or 
invalid encodings outside the signed portion of a certificate bypass security
restrictions and perform unauthorized actions. CVSS Base Score: 1.2 CVSS 
Temporal Score: See 
http://exchange.xforce.ibmcloud.com/#/vulnerabilities/99709 for the current 
score CVSS Environmental Score*: Undefined CVSS Vector: 
(AV:L/AC:H/Au:N/C:N/I:P/A:N)

CVEID: CVE-2015-0286
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by an error
in the ASN1_TYPE_cmp function when attempting to compare ASN.1 boolean types.
An attacker could exploit this vulnerability to crash any certificate 
verification operation and cause a denial of service. CVSS Base Score: 5 CVSS
Temporal Score: See 
https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101666 for the current
score CVSS Environmental Score*: Undefined CVSS Vector: 
(AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVEID: CVE-2015-0292
DESCRIPTION: OpenSSL could allow a remote attacker to execute arbitrary code 
on the system, caused by an error when processing base64 encoded data. An 
attacker could exploit this vulnerability using specially-crafted base 64 data
to corrupt memory and execute arbitrary code on the system and cause a denial
of service. CVSS Base Score: 7.5 CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101670 for the current
score CVSS Environmental Score*: Undefined CVSS Vector: 
(AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVEID: CVE-2015-0293
DESCRIPTION: OpenSSL is vulnerable to a denial of service. By sending a 
specially-crafted SSLv2 CLIENT-MASTER-KEY message, a remote attacker could 
exploit this vulnerability to trigger an assertion. CVSS Base Score: 5 CVSS 
Temporal Score: See 
https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101671 for the current
score CVSS Environmental Score*: Undefined CVSS Vector: 
(AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVEID: CVE-2015-0209
DESCRIPTION: OpenSSL could allow a remote attacker to execute arbitrary code 
on the system, caused by a use-after-free error in the d2i_ECPrivateKey or 
EVP_PKCS82PKEY function. An attacker could exploit this vulnerability to 
corrupt memory and execute arbitrary code on the system and cause a denial of
service. CVSS Base Score: 7.5 CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101674 for the current
score CVSS Environmental Score*: Undefined CVSS Vector: 
(AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVEID: CVE-2015-0288
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by an error
in the X509_to_X509_REQ function. An attacker could exploit this vulnerability
to trigger a NULL pointer dereference. CVSS Base Score: 5 CVSS Temporal Score:
See https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101675 for the 
current score CVSS Environmental Score*: Undefined CVSS Vector: 
(AV:N/AC:L/Au:N/C:N/I:N/A:P)

Affected Products and Versions

The following product, running on all supported platforms, is affected: 
IBM InfoSphere Information Server: versions 8.5, 8.7, 9.1, and 11.3

Remediation/Fixes

You should verify that applying this fix does not cause any compatibility 
issues.

InfoSphere Information Server 11.3   JR53129   --Upgrade to DataDirect ODBC drivers version 7.1.5 
                                               --Follow the driver post installation steps in this TechNote 
InfoSphere Information Server 9.1    JR53129   --Upgrade to DataDirect ODBC drivers version 7.1.5 
                                               --Follow the driver post installation steps in this TechNote 
InfoSphere Information Server 8.7    JR53129   --Apply IBM InfoSphere Information Server version 8.7 Fix Pack 2 
                                               --Upgrade to DataDirect ODBC drivers version 7.1.5 
                                               --Follow the driver post installation steps in this TechNote 
InfoSphere Information Server 8.5    JR53129   --Apply IBM InfoSphere Information Server version 8.5 Fix Pack 3 
                                               --Upgrade to DataDirect ODBC drivers version 7.1.5 
                                               --Follow the driver post installation steps in this TechNote

Note: The same fix may be listed under multiple vulnerabilities. Installing 
the fix addresses all vulnerabilities to which the fix applies. Also, some 
fixes require installing both a fix pack and a subsequent patch. While the fix
pack must be installed first, any additional patches required may be installed
in any order.

For IBM InfoSphere Information Server versions 8.0 and 8.1 IBM recommends 
upgrading to a fixed, supported version/release/platform of the product.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support 
alerts like this.

References

Complete CVSS Guide
On-line Calculator V2
OpenSSL Project vulnerability website (for detail on what versions are 
affected)
OpenSSL Advisory (January 2015) on above listed CVEs
OpenSSL Advisory (March 2015) on above listed CVEs

Related information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

21 May 2015: Original Version Published

*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the 
Reference section of this Security Bulletin. 

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the 
Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Cross reference information 
Segment                 Product                        Component  Platform                             Version              Edition
Information Management 	InfoSphere Information Server             AIX, HP-UX, Linux, Solaris, Windows  11.3, 8.5, 8.7, 9.1

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=EWD+
-----END PGP SIGNATURE-----