-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.1484
         Security Bulletin: Multiple vulnerabilities in IBM Java 6
                  SR16FP3 IF1 affect IBM Notes and Domino
                                9 June 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Domino
                   IBM Notes
Publisher:         IBM
Operating System:  AIX
                   Linux variants
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Increased Privileges            -- Remote/Unauthenticated
                   Access Privileged Data          -- Remote/Unauthenticated
                   Modify Arbitrary Files          -- Remote/Unauthenticated
                   Overwrite Arbitrary Files       -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Provide Misleading Information  -- Remote/Unauthenticated
                   Access Confidential Data        -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-2808 CVE-2015-1916 CVE-2015-1914
                   CVE-2015-0491 CVE-2015-0488 CVE-2015-0480
                   CVE-2015-0478 CVE-2015-0477 CVE-2015-0469
                   CVE-2015-0459 CVE-2015-0458 CVE-2015-0204
                   CVE-2015-0192  

Reference:         ASB-2015.0044
                   ASB-2015.0035
                   ASB-2015.0031
                   ASB-2015.0027
                   ESB-2015.0149
                   ESB-2015.0101
                   ESB-2015.0056
                   ESB-2015.0048.2

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21903541

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Multiple vulnerabilities in IBM Java 6 SR16FP3 IF1
affect IBM Notes and Domino

Document information

More support for:
IBM Domino
Security

Software version:
8.5, 8.5.1, 8.5.1.5, 8.5.2, 8.5.2.4, 8.5.3, 8.5.3.6, 9.0, 9.0.1, 9.0.1.3

Operating system(s):
AIX, AIX 64bit, Linux, Linux zSeries, Windows, Windows 64bit

Reference #:
1903541

Modified date:
2015-06-04

Security Bulletin

Summary

There are multiple vulnerabilities in IBM SDK Java Technology Edition,
Version 6 SR16FP3 IF1 that is used by IBM Notes and Domino. These issues
were disclosed as part of the Oracle April 2015 Critical Patch Update and
are resolved by IBM Java 6 SR16FP4.

Vulnerability Details

DESCRIPTION: This bulletin covers all applicable Java SE CVEs published
by Oracle as part of their April 2015 Critical Patch Update. For more
information, refer to Oracle's April 2015 CPU Advisory and the X-Force
database entries referenced below.

CVEID: CVE-2015-0491

    DESCRIPTION: An unspecified vulnerability in Oracle Java SE and JavaFX
    related to the 2D component has complete confidentiality impact,
    complete integrity impact, and complete availability impact.
    CVSS Base Score: 10
    CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/102329 for
    the current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2015-0459

    DESCRIPTION: An unspecified vulnerability in Oracle Java SE and JavaFX
    related to the 2D component has complete confidentiality impact,
    complete integrity impact, and complete availability impact.
    CVSS Base Score: 10
    CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/102328 for
    the current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2015-0469

    DESCRIPTION: An unspecified vulnerability in Oracle Java SE related
    to the 2D component has complete confidentiality impact, complete
    integrity impact, and complete availability impact.
    CVSS Base Score: 10
    CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/102327 for
    the current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2015-0458

    DESCRIPTION: An unspecified vulnerability in Oracle Java SE related
    to the Deployment component has complete confidentiality impact,
    complete integrity impact, and complete availability impact.
    CVSS Base Score: 7.6
    CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/102332 for
    the current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:H/Au:N/C:C/I:C/A:C)

CVEID: CVE-2015-0480

    DESCRIPTION: A directory traversal vulnerability in Oracle Java
    SE related to the Tools component and the extraction of JAR archive
    files could allow remote attcker to overwrite files on the system with
    privileges of another user.
    CVSS Base Score: 5.8
    CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/102334 for
    the current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:P)

CVEID: CVE-2015-0488

    DESCRIPTION: An unspecified vulnerability in Oracle Java SE and Jrockit
    related to the JSSE component could allow a remote attacker to cause
    a denial of service.
    CVSS Base Score: 5
    CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/102336 for
    the current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVEID: CVE-2015-0478

    DESCRIPTION: An unspecified vulnerability in Oracle Java SE and JRockit
    related to the JCE component could allow a remote attacker to obtain
    sensitive information.
    CVSS Base Score: 4.3
    CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/102339 for
    the current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVEID: CVE-2015-0477

    DESCRIPTION: An unspecified vulnerability in Oracle Java SE related to
    the Beans component has no confidentiality impact, partial integrity
    impact, and no availability impact.
    CVSS Base Score: 4.3
    CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/102337 for
    the current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVEID: CVE-2015-2808

    DESCRIPTION: The RC4 algorithm, as used in the TLS protocol and
    SSL protocol, could allow a remote attacker to obtain sensitive
    information. An attacker could exploit this vulnerability to remotely
    expose account credentials without requiring an active man-in-the-middle
    session. Successful exploitation could allow an attacker to retrieve
    credit card data or other sensitive information. This vulnerability
    is commonly referred to as "Bar Mitzvah Attack".
    CVSS Base Score: 5
    CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/101851 for
    the current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVEID: CVE-2015-1916

    DESCRIPTION: Server applications which use the IBM Java Secure Socket
    Extension provider to accept SSL/TLS connections are vulnerable to a
    denial of service attack due to an unspecified vulnerability.
    CVSS Base Score: 5
    CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/101995 for
    the current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVEID: CVE-2015-1914

    DESCRIPTION: A vulnerability in the IBM implementation of the Java
    Virtual Machine may allow untrusted code running under a security
    manager to bypass permission checks and view sensitive information.
    CVSS Base Score: 4.3
    CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/101908 for
    the current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVEID: CVE-2015-0192

    DESCRIPTION: A vulnerability in the IBM implementation of the Java
    Virtual Machine may, under limited circumstances, allow untrusted code
    running under a security manager to elevate its privileges.
    CVSS Base Score: 6.8
    CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/101008 for
    the current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVEID: CVE-2015-0204

    DESCRIPTION: A vulnerability in the OpenSSL ssl3_get_key_exchange
    function could allow a remote attacker to downgrade the security of
    certain TLS connections. An OpenSSL client accepts the use of an RSA
    temporary key in a non-export RSA key exchange ciphersuite. This could
    allow a remote attacker using man-in-the-middle techniques to facilitate
    brute-force decryption of TLS/SSL traffic between vulnerable clients
    and servers. This vulnerability is also known as the FREAK attack.
    CVSS Base Score: 4.3
    CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/99707 for
    the current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Affected Products and Versions

- - IBM Notes and Domino 9.0.1 Fix Pack 3 (plus Interim Fixes) and earlier
- - IBM Notes and Domino 8.5.3 Fix Pack 6 (plus Interim Fixes) and earlier
- - IBM Notes and Domino 8.5.3 Fix Pack 5 (plus Interim Fixes) and earlier
- - All 9.0 and 8.5.x releases of IBM Notes and Domino prior to those
listed above.

Remediation/Fixes


IBM Notes and Domino - Multiple vulnerabilities in IBM Java 6 SR16FP3 IF1
affect IBM Notes and Domino are also tracked as SPR HANA9W3KAB. Refer to
the JVM tabs in the technotes linked below for download links to a single
standalone Java patch that addresses these vulnerabilities.

    Interim Fixes for 9.0.1.x versions of IBM Notes, Domino, iNotes &
    Notes Browser Plug-in (technote 1657963)
    Interim Fixes for 8.5.3 Fix Pack 6 versions of IBM Notes, Domino &
    iNotes (technote 1663874)

Workarounds and Mitigations

Administrators can help to protect their Domino servers against unauthorized
access by strictly limiting the use of Java functions on the server
through careful population of the Programmability Restrictions section
on the Security tab of the Server document. In particular, IBM recommends
prohibiting server access by untrusted code, Java or otherwise.
Likewise, administrators can use Policies to configure Notes client
Execution Control Lists to limit such attacks against the Notes client.

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References
Complete CVSS Guide
On-line Calculator V2

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowledgement

CVE-2015-1916 was reported to IBM by Karthikeyan Bhargavan of the PROSECCO
team at INRIA

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Cross reference information

Segment			Product
Messaging Applications	IBM Notes

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=7J3k
-----END PGP SIGNATURE-----