-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.1771
  Security Bulletin: Multiple vulnerabilities in Java Runtime Environment
affects IBM DB2 Recovery Expert for Linux, UNIX and Windows (CVE-2015-0204,
        CVE-2015-0138, CVE-2015-2808, CVE-2015-0460, CVE-2015-470)
                                7 July 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM DB2 Recovery Expert
Publisher:         IBM
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Access Privileged Data          -- Remote/Unauthenticated
                   Modify Arbitrary Files          -- Remote/Unauthenticated
                   Provide Misleading Information  -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-2808 CVE-2015-0470 CVE-2015-0460
                   CVE-2015-0204 CVE-2015-0138 

Reference:         ASB-2015.0044
                   ASB-2015.0035
                   ASB-2015.0031
                   ESB-2015.0291
                   ESB-2015.0149
                   ESB-2015.0101
                   ESB-2015.0056
                   ESB-2015.0048.2

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21961493
   http://www-01.ibm.com/support/docview.wss?uid=swg21960231

Comment: This bulletin contains two (2) IBM security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Multiple vulnerabilities in Java Runtime Environment
affects IBM DB2 Recovery Expert for Linux, UNIX and Windows (CVE-2015-0204,
CVE-2015-0138, CVE-2015-2808, CVE-2015-0460, CVE-2015-470)

Document information

More support for:
DB2 Recovery Expert for Linux, UNIX and Windows

Software version:
3.1.0, 4.1.0

Operating system(s):
AIX, HP-UX, Linux, Solaris, Windows

Reference #:
1961493

Modified date:
2015-07-06

Security Bulletin

Summary

Various vulnerabilities in the Java Runtime Environment could affect IBM
DB2 Recovery Expert for Linux, UNIX and Windows.

Vulnerability Details

CVEID:CVE-2015-0204
DESCRIPTION:A vulnerability in the OpenSSL ssl3_get_key_exchange function
could allow a remote attacker to downgrade the security of certain TLS
connections. An OpenSSL client accepts the use of an RSA temporary key in a
non-export RSA key exchange ciphersuite. This could allow a remote attacker
using man-in-the-middle techniques to facilitate brute-force decryption of
TLS/SSL traffic between vulnerable clients and servers. This vulnerability
is also known as the FREAK attack.
CVSS Base Score: 4.3
CVSS Temporal Score: Seehttp://xforce.iss.net/xforce/xfdb/99707for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVEID:CVE-2015-0138
DESCRIPTION:A vulnerability in various IBM SSL/TLS implementations could
allow a remote attacker to downgrade the security of certain SSL/TLS
connections. An IBM SSL/TLS client implementation could accept the use of an
RSA temporary key in a non-export RSA key exchange ciphersuite. This could
allow a remote attacker using man-in-the-middle techniques to facilitate
brute-force decryption of TLS/SSL traffic between vulnerable clients and
servers. This vulnerability is also known as the FREAK attack.
CVSS Base Score: 4.3
CVSS Temporal Score: Seehttp://xforce.iss.net/xforce/xfdb/100691for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVEID:CVE-2015-2808
DESCRIPTION:The RC4 algorithm, as used in the TLS protocol and SSL protocol,
could allow a remote attacker to obtain sensitive information. An attacker
could exploit this vulnerability to remotely expose account credentials
without requiring an active man-in-the-middle session. Successful
exploitation could allow an attacker to retrieve credit card data or
other sensitive information. This vulnerability is commonly referred to as
"Bar Mitzvah Attack".
CVSS Base Score: 5
CVSS Temporal Score:
Seehttps://exchange.xforce.ibmcloud.com/vulnerabilities/101851for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

The following CVEs only apply to the HP-UX and Solaris platforms:

CVEID:CVE-2015-0460
DESCRIPTION:An unspecified vulnerability in Oracle Java SE related to the
Hotspot component has complete confidentiality impact, complete integrity
impact, and complete availability impact.
CVSS Base Score: 9.3
CVSS Temporal Score: Seehttp://xforce.iss.net/xforce/xfdb/102330for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVEID:CVE-2015-0470
DESCRIPTION:An unspecified vulnerability in Oracle Java SE related to the
Hotspot component has no confidentiality impact, partial integrity impact,
and no availability impact.
CVSS Base Score: 4.3
CVSS Temporal Score: Seehttp://xforce.iss.net/xforce/xfdb/102338for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Affected Products and Versions

IBM DB2 Recovery Expert for Linux, UNIX, and Windows versions 3.1 through 4.1

Remediation/Fixes

Replace existing JRE with JRE V7 SR9-Fix Pack 1
(http://www-01.ibm.com/support/docview.wss?uid=swg21639279).

You can replace the IBM Runtime Environment, Java Technology Edition that
is installed with IBM DB2 Recovery Expert for Linux, UNIX, and Windows with
the latest IBM Runtime Environment, Java Technology Edition following the
detailed instructions provided in the tech-note "Updating the JRE for DB2
Recovery Expert for Linux, UNIX and Windows".

Workarounds and Mitigations

Only CVE-2015-2808 can be mitigated. The other applicable CVEs have no
mitigation and the JRE must be upgraded.

Mitigation instructions for CVE-2015-2808 are available here:

    IBM SDK, Java Technology Edition, Version 8
    IBM SDK, Java Technology Edition, Version 7R1
    IBM SDK, Java Technology Edition, Version 7

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References
Complete CVSS Guide
On-line Calculator V2

Complete CVSS Guide
On-line Calculator V2
IBM Java SDK Security Bulletin

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

03 July 2015 - Initial Security Bulletin

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- ------------------------------------------------------------------------
Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects IBM
DB2 Recovery Expert for Linux, UNIX and Windows (CVE-2015-4000)

Document information
More support for:
DB2 Recovery Expert for Linux, UNIX and Windows

Software version:
3.1.0, 4.1.0

Operating system(s):
AIX, HP-UX, Linux, Solaris, Windows

Reference #:
1960231

Modified date:
2015-07-06

Security Bulletin

Summary

The Logjam Attack on TLS connections using the Diffie-Hellman (DH)
key exchange protocol affects IBM DB2 Recovery Expert for Linux, UNIX,
and Windows

Vulnerability Details

CVEID: CVE-2015-4000
DESCRIPTION: The TLS protocol could allow a remote attacker to obtain
sensitive information, caused by the failure to properly convey a DHE_EXPORT
ciphersuite choice. An attacker could exploit this vulnerability using
man-in-the-middle techniques to force a downgrade to 512-bit export-grade
cipher. Successful exploitation could allow an attacker to recover the
session key as well as modify the contents of the traffic. This vulnerability
is commonly referred to as "Logjam".
CVSS Base Score: 4.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/103294 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Affected Products and Versions

IBM DB2 Recovery Expert for Linux, UNIX, and Windows versions 3.1 through 4.1

Remediation/Fixes

Replace existing JRE with JRE V7 SR9-Fix Pack 1
(http://www-01.ibm.com/support/docview.wss?uid=swg21639279).

You can replace the IBM Runtime Environment, Java Technology Edition that
is installed with IBM DB2 Recovery Expert for Linux, UNIX, and Windows with
the latest IBM Runtime Environment, Java Technology Edition following
the detailed instructions provided in the tech-note "Updating the JRE for
DB2 Recovery Expert for Linux, UNIX and Windows".

Workarounds and Mitigations

Disable the DH and DHE cipher suites by adding "DH, DHE" to the list of
disabled algorithms defined by the jdk.tls.disabledAlgorithms security
property in java.security file.

Edit the java.security file that is located in the Recovery Expert
installation directory:

   /jre/lib/security/java.security

Add the following line and save the file:

   jdk.tls.disabledAlgorithms=DH, DHE

If the jdk.tls.disabledAlgorithms property was already enabled (without a
"#" character at the beginning of the line), i.e.:

   jdk.tls.disabledAlgorithms=SSLv3

then append the text ", DH, DHE" to the end of the line and save the file.

   jdk.tls.disabledAlgorithms=SSLv3, DH, DHE

Restart the Recovery Expert server for this change to take effect.

You should verify applying this configuration change does not cause any
compatibility issues. If you change the default setting after applying the
fix, you will expose yourself to the attack described above. IBM recommends
that you review your entire environment to identify other areas where you
have enabled the Diffie-Hellman key-exchange protocol used in TLS and take
appropriate mitigation and remediation actions.
Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References
Complete CVSS Guide
On-line Calculator V2

Complete CVSS Guide
On-line Calculator V2

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Change History

03 July 2015 - Initial Security Bulletin

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVZsfTH6ZAP0PgtI9AQKvvg//ayCklXIgKaAQDCxSGRUuPAQ6B2AXbHwq
zLnhyv1gBXzsSf0LC30Bh9CNxTzNvMul6DOLbDvbdeSQ7m6CxBrSJTVEfMAooJMx
YT7p7+9PpncdlEosfbw1P9EIUrtVvWgJ11IJvO4hubrPqBXNnn7fJ6SewJWWrx4A
tg9ZMArGqF7JPOOYFfbmzI8S6WvnHjxKhVLkCm39JkBTFUH2cZZ/Mqli44WWmW0V
xjevuyHoRJiCHpbnGY0Z5d1PExM4TCwRTUeZ6MickVMxYg6F4hpZhnxb/jj/Y0mm
KuZWm9B+mzY3z0a17H6gv4XPVlOeN3z5C35iVn13ixxqobb/sLSpb+/GRaLDi/D+
VYte6ROhIlOUCDm8Rv3OrkW0S892dfHtMP0pxQAxZFkkxNG3pDO9joQ3irUnK4Bh
fqOO4je7gz+MZ2t+MKGpw0RmNUY5TPl3S/iCUVZrQby4K1axpsJmcWTx/QscTWO2
pebBjG6Ws4H7Q44Qh9JgbnFUTsmQsTal6sxI1r8jar1S2vl2oGMy/T3fHAoTVJM4
r4grbmLHHlelzSt8VArt0EHFUT5N2ZLVdRjNFHZapjq1QN20j4HwiT7zuoMFibBa
BT0fHvY6OmIqXXUHnDd3mcEeiYWh1T7E2hAoHWdvED+QElJphabugfgGkucq2XD5
XV/hVgYZL7U=
=TXAs
-----END PGP SIGNATURE-----