Operating System:

[Appliance]

Published:

15 September 2015

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.2415
   Security Bulletin: Multiple vulnerabilities in Oracle Java SE Runtime
   Environment, Version 1.7.0 affect IBM Flex System Manager (FSM) SMIA
             Configuration Tool (CVE-2015-0488, CVE-2015-0478)
                             15 September 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Flex System Manager (FSM)
Publisher:         IBM
Operating System:  Network Appliance
Impact/Access:     Denial of Service        -- Remote/Unauthenticated
                   Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-0488 CVE-2015-0478 

Reference:         ASB-2015.0035
                   ESB-2015.2412
                   ESB-2015.2378
                   ESB-2015.2244
                   ESB-2015.2242
                   ESB-2015.2169
                   ESB-2015.2104
                   ESB-2015.2103
                   ESB-2015.2102
                   ESB-2015.2083
                   ESB-2015.2040

Original Bulletin: 
   https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098656

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Multiple vulnerabilities in Oracle Java SE Runtime 
Environment, Version 1.7.0 affect IBM Flex System Manager (FSM) SMIA 
Configuration Tool (CVE-2015-0488, CVE-2015-0478)

Summary

There are multiple vulnerabilities in Oracle Java SE Runtime Environment, 
Version 1.7.0 that is used by IBM Flex System Manager (FSM) SMIA Configuration
Tool. These issues were disclosed as part of the Oracle updates in April 2015.

Vulnerability Details:

CVE-ID: CVE-2015-0488

Description: An unspecified vulnerability in Oracle Java SE and Jrockit 
related to the JSSE component could allow a remote attacker to cause a denial
of service.

CVSS Base Score: 5

CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/102336 for current
score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-ID: CVE-2015-0478

Description: An unspecified vulnerability in Oracle Java SE and JRockit 
related to the JCE component could allow a remote attacker to obtain sensitive
information.

CVSS Base Score: 4.3

CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/102339 for current
score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Affected products and versions

  Flex System Manager 1.1.x.x

  Flex System Manager 1.2.0.x

  Flex System Manager 1.2.1.x

  Flex System Manager 1.3.0.x

  Flex System Manager 1.3.1.x

  Flex System Manager 1.3.2.x

Remediation/Fixes:

IBM recommends updating the Flex System Manager (FSM) SMIA using the 
instructions referenced in the table below.

Product 		VRMF 		APAR 	SMIA Remediation

Flex System Manager 	1.3.3.x 	IT10917 fsmfix1.3.3.0_IT10917

Flex System Manager 	1.3.2.x 	IT10917 fsmfix1.3.2.0_IT10917

Flex System Manager 	1.3.1.x 	IT10917 fsmfix1.3.1.0_IT10917

Flex System Manager 	1.3.0.x 	IT10917 Upgrade to FSM 1.3.3.0 and follow the 
						appropriate remediation for all 
						vulnerabilities, or contact IBM Support 
						and refer to this APAR to obtain a 
						limited availability FSM SMIA fix for 
						version 1.3.0.x.

Flex System Manager 	1.2.1.x 	IT10917 IBM is no longer providing code updates 
						for this release, upgrade to FSM 1.3.3.0 
						and follow the appropriate remediation 
						for all vulnerabilities.

Flex System Manager 	1.2.0.x 	IT10917 IBM is no longer providing code updates 
						for this release, upgrade to FSM 1.3.3.0 
						and follow the appropriate remediation 
						for all vulnerabilities.

Workarounds and Mitigations:

None

References:

Complete CVSS v2 Guide

On-line Calculator v2

Oracle Critical Patch Update Advisory - Apr 2015

Related Information:

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

Acknowledgement

None

Change History

9 October 2015: Original Copy Published

* The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the 
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the 
Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Nf3J
-----END PGP SIGNATURE-----