-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.0133
       Multiple Security Vulnerabilities exist in IBM Cognos Express
                              19 January 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Cognos Express
Publisher:         IBM
Operating System:  Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                   Access Privileged Data          -- Remote/Unauthenticated      
                   Denial of Service               -- Remote/Unauthenticated      
                   Cross-site Scripting            -- Remote with User Interaction
                   Provide Misleading Information  -- Remote/Unauthenticated      
                   Unauthorised Access             -- Remote/Unauthenticated      
                   Reduced Security                -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-4749 CVE-2015-4748 CVE-2015-4000
                   CVE-2015-1969 CVE-2015-1931 CVE-2015-1914
                   CVE-2015-0227 CVE-2014-7810 CVE-2014-0230

Reference:         ASB-2015.0103
                   ASB-2015.0070
                   ESB-2015.2568
                   ESB-2015.2554
                   ESB-2015.2469
                   ESB-2015.2205
                   ESB-2015.2195
                   ESB-2015.1822
                   ESB-2015.1683
                   ESB-2015.1565
                   ESB-2015.1535

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21972376

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Multiple Security Vulnerabilities exist in IBM Cognos
Express.

Security Bulletin

Document information

More support for:

Cognos Express

Software version:

9.5, 10.1, 10.2.1, 10.2.2

Operating system(s):

Windows

Reference #:

1972376

Modified date:

2016-01-18

Summary

There are multiple vulnerabilities in Open Source Apache Tomcat that is used
by IBM Cognos Express. Additionally, there are multiple vulnerabilities in
IBM Runtime Environment Java Technology Edition, Version 6 that is used by
IBM Cognos Express. This bulletin also addresses LOGJAM: The TLS protocol
could allow a remote attacker to obtain sensitive information, caused by the
failure to properly convey a DHE_EXPORT ciphersuite choice.

Vulnerability Details

CVEID:

CVE-2015-0227

DESCRIPTION:

Apache WSS4J could allow a remote attacker to bypass security restrictions,
caused by the failure to properly enforce the
requireSignedEncryptedDataElements property. An attacker could exploit this
vulnerability using various types of wrapping attacks to bypass security
restrictions and perform unauthorized actions.

CVSS Base Score: 5

CVSS Temporal Score: See

http://xforce.iss.net/xforce/xfdb/100837

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVEID:

CVE-2014-0230

DESCRIPTION:

Apache Tomcat is vulnerable to a denial of service, caused by missing
limitations on request body size. By sending a specially crafted request to
the server, an attacker could keep a connection open and force Tomcat to keep
a processing thread allocated to the connection.

CVSS Base Score: 5

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/102131

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVEID:

CVE-2015-1914

DESCRIPTION:

A vulnerability in the IBM implementation of the Java Virtual Machine may
allow untrusted code running under a security manager to bypass permission
checks and view sensitive information.

CVSS Base Score: 4.3

CVSS Temporal Score: See

http://xforce.iss.net/xforce/xfdb/101908

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVEID:

CVE-2014-7810

DESCRIPTION:

Apache Tomcat could allow a remote attacker to bypass security restrictions,
caused by the use of expression language. An attacker could exploit this
vulnerability to bypass the protections of a Security Manager.

CVSS Base Score: 5

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/103155

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVEID:

CVE-2015-1969

DESCRIPTION:

IBM Cognos Business Intelligence is vulnerable to cross-site scripting,
caused by improper validation of user-supplied input. A remote attacker could
exploit this vulnerability using a specially-crafted URL to execute script in
a victim's Web browser within the security context of the hosting Web site,
once the URL is clicked. An attacker could use this vulnerability to steal
the victim's cookie-based authentication credentials.

CVSS Base Score: 3.5

CVSS Temporal Score: See

http://xforce.iss.net/xforce/xfdb/103607

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N)

CVEID:

CVE-2015-4000

DESCRIPTION:

The TLS protocol could allow a remote attacker to obtain sensitive
information, caused by the failure to properly convey a DHE_EXPORT
ciphersuite choice. An attacker could exploit this vulnerability using man-
in-the-middle techniques to force a downgrade to 512-bit export-grade cipher.
Successful exploitation could allow an attacker to recover the session key as
well as modify the contents of the traffic. This vulnerability is commonly
referred to as "Logjam".

CVSS Base Score: 4.3

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/103294

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVEID:

CVE-2015-4748

DESCRIPTION:

An unspecified vulnerability related to the Security component has complete
confidentiality impact, complete integrity impact, and complete availability
impact.

CVSS Base Score: 7.6

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/104729

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:H/Au:N/C:C/I:C/A:C)

CVEID:

CVE-2015-4749

DESCRIPTION:

An unspecified vulnerability related to the JNDI component could allow a
remote attacker to cause a denial of service.

CVSS Base Score: 4.3

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/104740

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVEID:

CVE-2015-1931

DESCRIPTION:

IBM Java Security Components store plain text data in memory dumps, which
could allow a local attacker to obtain information to aid in further attacks
against the system.

CVSS Base Score: 2.1

CVSS Temporal Score: See

http://xforce.iss.net/xforce/xfdb/102967

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:N/A:N)

Affected Products and Versions

IBM Cognos Express 9.5.2

IBM Cognos Express 10.1.x

IBM Cognos Express 10.2.1

IBM Cognos Express 10.2.2

Remediation/Fixes

IBM Cogonos Express 10.2.1

The recommended solution is to apply the fix for versions listed as soon as
practical.

IBM Cogonos Express 10.2.1 FP4

You should verify applying this configuration change does not cause any
compatibility issues. If you change the default setting after applying the
fix, you will expose yourself to the attack described above. IBM recommends
that you review your entire environment to identify other areas where you
have enabled the Diffie-Hellman key-exchange protocol used in TLS and take
appropriate mitigation and remediation actions.

As the length of the server key size are increased, the amount of CPU
required for full TLS/SSL handshake can significantly increase. Please
carefully test and assess the impact to your CPU requirements to ensure
sufficient CPU resources, otherwise the system availability may be impacted.


IBM Cognos Express 10.2.2

IBM Cognos TM1 and IBM Cognos Business Intelligence are shipped as components
of IBM Cognos Express. Information about a security vulnerability affecting
IBM Cognos TM1 and IBM Cognos Business Intelligence

has been published in their respective Security Bulletins.

Security Bulletin: IBM Cognos TM1 is affected by multiple vulnerabilities

Security Bulletin: IBM Cognos Business Intelligence Sever 2015Q3 Security
Updater : IBM Cognos Business Intelligence Server is affected by multiple
vulnerabilities

IBM Cognos Express 9.5.2 and 10.1.x

IBM Cognos Express 9.5 and 10.1.x customers should upgrade to a more current
version and apply the corresponding update. Please contact Customer Support
with any questions.

https://www-947.ibm.com/support/entry/myportal/product/cognos/cognos_express?productContext=-15869866

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to

My Notifications

to be notified of important product support alerts like this.

References

Complete CVSS v2 Guide

On-line Calculator v2

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

Acknowledgement

CVE-2015-4000 was reported to IBM by The WeakDH team at

https://weakdh.org

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=6CcC
-----END PGP SIGNATURE-----