-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.2259
 Security Bulletin: Vulnerabilities in OpenSSL affect IBM Algorithmics One
               (CVE-2015-0209, CVE-2015-0286, CVE-2015-0289)
                              27 August 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Algorithmics One
Publisher:         IBM
Operating System:  AIX
                   Linux variants
                   Solaris
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-0289 CVE-2015-0286 CVE-2015-0209

Reference:         ASB-2015.0070
                   ASB-2015.0044
                   ASB-2015.0027
                   ESB-2015.2244
                   ESB-2015.0711
                   ESB-2015.0687.2
                   ESB-2015.0685
                   ESB-2015.0680.2
                   ESB-2015.0678

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21964164

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Vulnerabilities in OpenSSL affect IBM Algorithmics One
(CVE-2015-0209, CVE-2015-0286, CVE-2015-0289)

Document information

More support for:
Algo One
Algo Core

Software version:
4.7, 4.7.1, 4.8, 4.9, 4.9.1, 5.0

Operating system(s):
AIX, Linux, Solaris, Windows

Reference #:
1964164

Modified date:
2015-08-26

Security Bulletin

Summary

OpenSSL vulnerabilities were disclosed on March 19, 2015 by the OpenSSL
Project. IBM Algorithmics One has addressed the applicable CVEs.

Vulnerability Details

CVEID: CVE-2015-0209
DESCRIPTION: OpenSSL could allow a remote attacker to execute arbitrary code
on the system, caused by a use-after-free error in the d2i_ECPrivateKey
or EVP_PKCS82PKEY function. An attacker could exploit this vulnerability
using a malformed Elliptic Curve (EC) private-key file to corrupt memory
and execute arbitrary code on the system and cause a denial of service.
CVSS Base Score: 6.8
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101674 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVEID: CVE-2015-0286
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by
an error in the ASN1_TYPE_cmp function when attempting to compare ASN.1
boolean types. An attacker could exploit this vulnerability to crash any
certificate verification operation and cause a denial of service.
CVSS Base Score: 5.0
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101666 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVEID: CVE-2015-0289
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by the
failure to properly handle missing outer ContentInfo by the PKCS#7 parsing
code. An attacker could exploit this vulnerability using a malformed
ASN.1-encoded PKCS#7 blob to trigger a NULL pointer dereference.
CVSS Base Score: 5.0
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101669 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Affected Products and Versions

Algo One Core Versions 4.7.0 through 5.0.0
Algo One ASE Versions 4.7.0 through 4.9.0
Algo One PCRE Versions 4.7.0 through 4.9.0
Algo One Aggregation Version 4.9.0
Algo One MAG Versions 4.7.0 through 4.8.0

Remediation/Fixes

A fix has been created for each affected version of the named
product. Download and install the appropriate fix as soon as
practicable. Fixes and installation instructions are provided at the URLs
listed below:


Patch Number	Download URL

Algo One Core 500-206
http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm~Information+Management&product=ibm/Information+Management/Algo+One&release=All&platform=All&function=fixId&fixids=5.0.0.0-Algo-One-if0206:0&includeSupersedes=0&source=fc&login=true

Algo One Core 490-176
http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm~Information+Management&product=ibm/Information+Management/Algo+One&release=All&platform=All&function=fixId&fixids=4.9.0.0-Algo-One-if0176:0&includeSupersedes=0&source=fc&login=true

Algo One Core 480-076
http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm~Information+Management&product=ibm/Information+Management/Algo+One&release=All&platform=All&function=fixId&fixids=4.8.0.0-Algo-One-if0076:0&includeSupersedes=0&source=fc&login=true

Algo One Core 471-337
http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm~Information+Management&product=ibm/Information+Management/Algo+One&release=All&platform=All&function=fixId&fixids=4.7.1.0-Algo-One-if0337:0&includeSupersedes=0&source=fc&login=true

Algo One Core 470-318
http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm~Information+Management&product=ibm/Information+Management/Algo+One&release=All&platform=All&function=fixId&fixids=4.7.0.0-Algo-One-if0318:0&includeSupersedes=0&source=fc&login=true

Algo One ASE 490-177
http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm~Information+Management&product=ibm/Information+Management/Algo+One&release=All&platform=All&function=fixId&fixids=4.9.0.0-Algo-One-if0177:0&includeSupersedes=0&source=fc&login=true

Algo One ASE 480-077
http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm~Information+Management&product=ibm/Information+Management/Algo+One&release=All&platform=All&function=fixId&fixids=4.8.0.0-Algo-One-if0077:0&includeSupersedes=0&source=fc&login=true

Algo One ASE 471-338
http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm~Information+Management&product=ibm/Information+Management/Algo+One&release=All&platform=All&function=fixId&fixids=4.7.1.0-Algo-One-if0338:0&includeSupersedes=0&source=fc&login=true

Algo One ASE 470-319
http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm~Information+Management&product=ibm/Information+Management/Algo+One&release=All&platform=All&function=fixId&fixids=4.7.0.0-Algo-One-if0319:0&includeSupersedes=0&source=fc&login=true

Algo One PCRE 490-178
http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm~Information+Management&product=ibm/Information+Management/Algo+One&release=All&platform=All&function=fixId&fixids=4.9.0.0-Algo-One-if0178:0&includeSupersedes=0&source=fc&login=true

Algo One PCRE 480-078
http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm~Information+Management&product=ibm/Information+Management/Algo+One&release=All&platform=All&function=fixId&fixids=4.8.0.0-Algo-One-if0078:0&includeSupersedes=0&source=fc&login=true

Algo One PCRE 471-339
http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm~Information+Management&product=ibm/Information+Management/Algo+One&release=All&platform=All&function=fixId&fixids=4.7.1.0-Algo-One-if0339:0&includeSupersedes=0&source=fc&login=true

Algo One PCRE 470-320
http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm~Information+Management&product=ibm/Information+Management/Algo+One&release=All&platform=All&function=fixId&fixids=4.7.0.0-Algo-One-if0320:0&includeSupersedes=0&source=fc&login=true

Algo One Aggregation 490-179
http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm~Information+Management&product=ibm/Information+Management/Algo+One&release=All&platform=All&function=fixId&fixids=4.9.0.0-Algo-One-if0179:0&includeSupersedes=0&source=fc&login=true

Algo One MAG 480-079
http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm~Information+Management&product=ibm/Information+Management/Algo+One&release=All&platform=All&function=fixId&fixids=4.8.0.0-Algo-One-if0079:0&includeSupersedes=0&source=fc&login=true

Algo One MAG 471-340
http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm~Information+Management&product=ibm/Information+Management/Algo+One&release=All&platform=All&function=fixId&fixids=4.7.1.0-Algo-One-if0340:0&includeSupersedes=0&source=fc&login=true

Algo One MAG 470-321
http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm~Information+Management&product=ibm/Information+Management/Algo+One&release=All&platform=All&function=fixId&fixids=4.7.0.0-Algo-One-if0321:0&includeSupersedes=0&source=fc&login=true

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References
Complete CVSS v2 Guide
On-line Calculator v2

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

26 August 2015:Original Copy Published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=fG0c
-----END PGP SIGNATURE-----