-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.2598
Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM
           Cognos Command Center (CVE-2015-2613, CVE-2015-2601,
                       CVE-2015-2625, CVE-2015-1931)
                              15 October 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Cognos Command Center
Publisher:         IBM
Operating System:  Windows
Impact/Access:     Access Privileged Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-2625 CVE-2015-2613 CVE-2015-2601
                   CVE-2015-1931  

Reference:         ASB-2015.0070
                   ESB-2015.2019
                   ESB-2015.2006
                   ESB-2015.1991
                   ESB-2015.1955
                   ESB-2015.1941
                   ESB-2015.1917
                   ESB-2015.1890
                   ESB-2015.1873

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21967158

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM 
Cognos Command Center (CVE-2015-2613, CVE-2015-2601, CVE-2015-2625, 
CVE-2015-1931)

Security Bulletin

Document information

More support for:

Cognos Command Center

Software version:

10.1, 10.2, 10.2.1, 10.2.2

Operating system(s):

Windows

Software edition:

All Editions

Reference #:

1967158

Modified date:

2015-10-14

Summary

There are multiple vulnerabilities in IBM Runtime Environment Java Technology
Edition, Version 6 that is used by IBM Cognos Command Center. These issues 
were disclosed as part of the IBM Java SDK updates in July 2015

Vulnerability Details

CVEID: CVE-2015-2613

DESCRIPTION: An unspecified vulnerability related to the JCE component could 
allow a remote attacker to obtain sensitive information.

CVSS Base Score: 5

CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/104734 for the current 
score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVEID: CVE-2015-2601

DESCRIPTION: An unspecified vulnerability related to the JCE component could 
allow a remote attacker to obtain sensitive information.

CVSS Base Score: 5

CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/104733 for the current 
score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVEID: CVE-2015-2625

DESCRIPTION: An unspecified vulnerability related to the JSSE component could
allow a remote attacker to obtain sensitive information.

CVSS Base Score: 2.6

CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/104743 for the current 
score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:N/A:N)

CVEID: CVE-2015-1931

DESCRIPTION: IBM Java Security Components store plain text data in memory 
dumps, which could allow a local attacker to obtain information to aid in 
further attacks against the system.

CVSS Base Score: 2.1

CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/102967 for the 
current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:N/A:N)

Affected Products and Versions

IBM Cognos Command Center 10.1 All Editions

IBM Cognos Command Center 10.2 All Editions

IBM Cognos Command Center 10.2.1 All Editions

IBM Cognos Command Center 10.2.2 All Editions

Remediation/Fixes

The recommended solution is to apply the IBM JRE 6.0 SR16FP7 to the following
versions of

IBM Cognos Command Center:

    IBM Cognos Command Center 10.1

    IBM Cognos Command Center 10.2

    IBM Cognos Command Center 10.2.1

    IBM Cognos Command Center 10.2.2

The fix for all affected versions is found here: 
http://www.ibm.com/support/fixcentral/swg/quickorder?parent=Cognos&product=ibm/Information+Management/Cognos+Command+Center&release=10.2.2&platform=Windows+32-bit,+x86&function=fixId&fixids=10.2.2-BA-CCC-Win32-JRE-60SR16FP7

Installation instructions for applying this fix.

For Microsoft Windows servers where the Agent or Server component is 
installed.

1. Download the 32 bit IBM Java JRE (file name: ibm-java-jre-60-win-i386.zip,
Size: 75 MB).

2. Stop the CccServer, CccQueue and CccAgent Microsoft Windows services.

3. For IBM Cognos Command Center 10.1 and 10.2: Rename the 
<INSTALLDIR>\Common\java directory to <INSTALLDIR>\Common\java.orig

4. For IBM Cognos Command Center 10.2.1:Rename the 
<INSTALLDIR>\Common\java.6.0.16.0 directory to 
<INSTALLDIR>\Common\java.6.0.16.0.orig

5. For IBM Cognos Command Center 10.2.2:Rename the 
<INSTALLDIR>\Common\java.6.0.16 directory to 
<INSTALLDIR>\Common\java.6.0.16.orig

6. For IBM Cognos Command Center 10.1 and 10.2: Unpack the content of the 
ibm-java-jre-60-win-i386.zip file to <INSTALLDIR>\Common\java

7. For IBM Cognos Command Center 10.2.1: Unpack the content of the 
ibm-java-jre-60-win-i386.zip file to <INSTALLDIR>\Common\java.6.0.16.0

8. For IBM Cognos Command Center 10.2.2: Unpack the content of the 
ibm-java-jre-60-win-i386.zip file to <INSTALLDIR>\Common\java.6.0.16.

9. Start the CccAgent, CccQueue and CccServer Microsoft Windows services.

10. Validate the installation by testing the connectivity to the agent using 
the CCC Client.

For IBM Cognos Command Center 10.1 and 10.2 with above fix applied: Before 
upgrading your installation from 10.1 to 10.2 respectively from 10.2 to 10.2.1
or 10.2.2 please revert to original \java\ directory:

1. Stop the CccServer, CccQueue and CccAgent Windows services.

2. Rename the <INSTALLDIR>\Common\java directory to 
<INSTALLDIR>\Common\java.cve

3. Rename the <INSTALLDIR>\Common\java.orig directory to 
<INSTALLDIR>\Common\java

4. Proceed to upgrade your Cognos Command Center installation to a newer 
version.

5. After upgrade to newer version is done, please reapply this fix starting 
from Step 1.

You should verify applying this fix does not cause any compatibility issues.

Workarounds and Mitigations

None.

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support 
alerts like this.

References

Complete CVSS v2 Guide

On-line Calculator v2

IBM Java SDK Security Bulletin

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

Change History

14 October 2015 Original Version Published

*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the 
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the 
Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Xk16
-----END PGP SIGNATURE-----