-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.0525
            Multiple vulnerabilities in IBM Java SDK affect AIX
                             29 February 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Java SDK
Publisher:         IBM
Operating System:  AIX
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                   Access Privileged Data          -- Remote with User Interaction
                   Modify Arbitrary Files          -- Remote/Unauthenticated      
                   Denial of Service               -- Remote/Unauthenticated      
                   Provide Misleading Information  -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-0494 CVE-2016-0483 CVE-2016-0475
                   CVE-2016-0466 CVE-2016-0448 CVE-2016-0402
                   CVE-2015-8540 CVE-2015-8472 CVE-2015-8126
                   CVE-2015-7981 CVE-2015-7575 CVE-2015-5041

Reference:         ASB-2016.0004
                   ESB-2016.0521
                   ESB-2016.0519
                   ESB-2016.0518
                   ESB-2016.0516
                   ESB-2016.0508
                   ESB-2016.0507
                   ESB-2016.0477
                   ESB-2016.0475
                   ESB-2016.0474

Original Bulletin: 
   http://aix.software.ibm.com/aix/efixes/security/java_jan2016_advisory.asc

- --------------------------BEGIN INCLUDED TEXT--------------------

IBM SECURITY ADVISORY

First Issued: Thu Feb 25 08:44:57 CST 2016 


The most recent version of this document is available here:

http://aix.software.ibm.com/aix/efixes/security/java_jan2016_advisory.asc
https://aix.software.ibm.com/aix/efixes/security/java_jan2016_advisory.asc
ftp://aix.software.ibm.com/aix/efixes/security/java_jan2016_advisory.asc

 
Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect AIX
    CVE-2015-8472 CVE-2016-0475 CVE-2016-0466 CVE-2016-0402 CVE-2015-7575
    CVE-2016-0448 CVE-2016-0494 CVE-2016-0483 CVE-2015-5041 CVE-2015-7981
    CVE-2015-8126 CVE-2015-8540


===============================================================================

SUMMARY:

    There are multiple vulnerabilities in IBM SDK Java Technology Edition,
    Versions 6, 7, 7.1, 8 that are used by AIX. These issues were disclosed
    as part of the IBM Java SDK updates in January 2016 and includes the
    vulnerability commonly referred to as "SLOTH".


===============================================================================

VULNERABILITY DETAILS:

    CVEID: CVE-2015-8472 
    DESCRIPTION: libpng is vulnerable to a buffer overflow, caused by improper
        bounds checking by the png_get_PLTE() and png_set_PLTE() functions. By
        persuading a victim to open a specially crafted PNG image, a remote
        attacker could overflow a buffer and execute arbitrary code on the
        system or cause the application to crash.
    CVSS Base Score: 6.3 
    CVSS Temporal Score: See
        https://exchange.xforce.ibmcloud.com/vulnerabilities/109392 for the
        current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)

    CVEID: CVE-2016-0475
    DESCRIPTION: An unspecified vulnerability in Oracle Java SE Java SE
        Embedded and Jrockit related to the Libraries component has partial
        confidentiality impact, partial integrity impact, and no availability
        impact.
    CVSS Base Score: 5.8
    CVSS Temporal Score: See
        https://exchange.xforce.ibmcloud.com/vulnerabilities/109946 for the
        current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)

    CVEID: CVE-2016-0466
    DESCRIPTION: An unspecified vulnerability in Oracle Java SE Java SE
        Embedded and Jrockit related to the JAXP component could allow a
        remote attacker to cause a denial of service resulting in a partial
        availability impact using unknown attack vectors.
    CVSS Base Score: 5
    CVSS Temporal Score: See
        https://exchange.xforce.ibmcloud.com/vulnerabilities/109948 for the
        current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

    CVEID: CVE-2016-0402
    DESCRIPTION: An unspecified vulnerability in Oracle Java SE and Java SE
        Embedded related to the Networking component has no confidentiality
        impact, partial integrity impact, and no availability impact.
    CVSS Base Score: 5
    CVSS Temporal Score: See
        https://exchange.xforce.ibmcloud.com/vulnerabilities/109947 for the
        current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N)

    CVEID: CVE-2015-7575
    DESCRIPTION: The TLS protocol could allow weaker than expected security
        caused by a collision attack when using the MD5 hash function for
        signing a ServerKeyExchange message during a TLS handshake. An
        attacker could exploit this vulnerability using man-in-the-middle
        techniques to impersonate a TLS server and obtain credentials.
        This vulnerability is commonly referred to as "SLOTH".
    CVSS Base Score: 7.1
    CVSS Temporal Score: See
        https://exchange.xforce.ibmcloud.com/vulnerabilities/109415 for the
        current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N)

    CVEID: CVE-2016-0448
    DESCRIPTION: An unspecified vulnerability in Oracle Java SE and Java SE
        Embedded related to the JMX component could allow a remote attacker to
        obtain sensitive information resulting in a partial confidentiality
        impact using unknown attack vectors.
    CVSS Base Score: 4
    CVSS Temporal Score: See
        https://exchange.xforce.ibmcloud.com/vulnerabilities/109949 for the
        current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N)

    CVEID: CVE-2016-0494
    DESCRIPTION: An unspecified vulnerability in Oracle Java SE and Java SE
        Embedded related to the 2D component has complete confidentiality
        impact, complete integrity impact, and complete availability impact.
    CVSS Base Score: 10
    CVSS Temporal Score: See
        https://exchange.xforce.ibmcloud.com/vulnerabilities/109944 for the
        current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

    CVEID: CVE-2016-0483
    DESCRIPTION: An unspecified vulnerability in Oracle Java SE Java SE
        Embedded and Jrockit related to the AWT component has complete
        confidentiality impact, complete integrity impact, and complete
        availability impact.
    CVSS Base Score: 10
    CVSS Temporal Score: See
        https://exchange.xforce.ibmcloud.com/vulnerabilities/109945 for the
        current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

    CVEID: CVE-2015-5041
    DESCRIPTION: A flaw in the IBM J9 JVM allows code to invoke non-public
        interface methods under these circumstances. Untrusted code could
        potentially exploit this. This could lead to sensitive data being
        exposed to an attacker, or the attacker being able to inject bad data.
    CVSS Base Score: 4.8
    CVSS Temporal Score: See
        https://exchange.xforce.ibmcloud.com/vulnerabilities/106719 for the
        current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)

    CVEID: CVE-2015-7981
    DESCRIPTION: libpng could allow a remote attacker to obtain sensitive
        information, caused by an out-of-bounds read in the
        png_convert_to_rfc1123 function. An attacker could exploit this
        vulnerability to obtain sensitive information.
    CVSS Base Score: 5.3
    CVSS Temporal Score: See
        https://exchange.xforce.ibmcloud.com/vulnerabilities/107740 for the
        current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

    CVEID: CVE-2015-8126
    DESCRIPTION: libpng is vulnerable to a buffer overflow, caused by improper
        bounds checking by the png_set_PLTE() and png_get_PLTE() functions. By
        persuading a victim to open a specially-crafted PNG file, a remote
        attacker could overflow a buffer and execute arbitrary code on the
        system.
    CVSS Base Score: 7.8
    CVSS Temporal Score: See
        https://exchange.xforce.ibmcloud.com/vulnerabilities/108010 for the
        current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)

    CVEID: CVE-2015-8540
    DESCRIPTION: libpng is vulnerable to a buffer overflow, caused by a read
        underflow in png_check_keyword in pngwutil.c. By sending an overly
        long argument, a remote attacker could overflow a buffer and execute
        arbitrary code on the system or cause the application to crash.
    CVSS Base Score: 9.8
    CVSS Temporal Score: See
        https://exchange.xforce.ibmcloud.com/vulnerabilities/109219 for the
        current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)


    AFFECTED PRODUCTS AND VERSIONS:

        AIX 5.3, 6.1, 7.1, 7.2
        VIOS 2.2.x

        The following fileset levels (VRMF) are vulnerable, if the 
        respective Java version is installed:
        For Java6:  Less than 6.0.0.535
        For Java7:  Less than 7.0.0.320
        For Java7.1:  Less than 7.1.0.200
        For Java8:  Less than 8.0.0.120

        Note:  to find out whether the affected Java filesets are installed 
        on your systems, refer to the lslpp command found in AIX user's guide.

        Example:  lslpp -L | grep -i java


    REMEDIATION:

        IBM SDK, Java Technology Edition, Version 6 Service Refresh 16 Fix 
        Pack 20 and subsequent releases:
    32-bit: https://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=6.0.0.0&platform=AIX+32-bit,+pSeries&function=all
    64-bit: https://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=6.0.0.0&platform=AIX+64-bit,+pSeries&function=all

        IBM SDK, Java Technology Edition, Version 7 Service Refresh 9 Fix
        Pack 30 and subsequent releases:
    32-bit: https://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=7.0.0.0&platform=AIX+32-bit,+pSeries&function=all 
    64-bit: https://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=7.0.0.0&platform=AIX+64-bit,+pSeries&function=all

        IBM SDK, Java Technology Edition, Version 7R1 Service Refresh 3
        Fix Pack 30 and subsequent releases:
    32-bit: https://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=7.1.0.0&platform=AIX+32-bit,+pSeries&function=all
    64-bit: https://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=7.1.0.0&platform=AIX+64-bit,+pSeries&function=all 

        IBM SDK, Java Technology Edition, Version 8 Service Refresh 2
        Fix Pack 10 and subsequent releases:
    32-bit: https://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=8.0.0.0&platform=AIX+32-bit,+pSeries&function=all 
    64-bit: https://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=8.0.0.0&platform=AIX+64-bit,+pSeries&function=all


    WORKAROUNDS AND MITIGATIONS:

        For CVE-2015-7575:
            Users of Java 7 and later can address the issue by updating the
            /jre/lib/security/java.security file as follows (both steps are
            required): 
            
            Add MD5 to the jdk.certpath.disabledAlgorithms property -
            e.g. jdk.certpath.disabledAlgorithms=MD2, RSA keySize < 1024, MD5 

            Add MD5withRSA to the jdk.tls.disabledAlgorithms property -
            e.g. jdk.tls.disabledAlgorithms=SSLv3, RC4, DH keySize < 768,
            MD5withRSA

            Java 6 requires code changes in the JSSE component in addition to
            the java.security file modifications, so upgrading the JDK is the
            only solution.


===============================================================================

CONTACT US:

    If you would like to receive AIX Security Advisories via email,
    please visit "My Notifications":

        http://www.ibm.com/support/mynotifications

    To view previously issued advisories, please visit:

        http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq
 
    Comments regarding the content of this announcement can be
    directed to:

        security-alert@austin.ibm.com

    To obtain the OpenSSL public key that can be used to verify the
    signed advisories and ifixes:

        Download the key from our web page:

    http://www.ibm.com/systems/resources/systems_p_os_aix_security_pubkey.txt

    To obtain the PGP public key that can be used to communicate
    securely with the AIX Security Team via security-alert@austin.ibm.com you
    can either:

        A. Download the key from our web page:

http://www.ibm.com/systems/resources/systems_p_os_aix_security_pgppubkey.txt

        B. Download the key from a PGP Public Key Server. The key ID is:

            0x28BFAA12

    Please contact your local IBM AIX support center for any
    assistance.


REFERENCES:
 
    Complete CVSS v2 Guide:
        http://www.first.org/cvss/v2/guide 
    On-line Calculator v2:
        http://nvd.nist.gov/CVSS-v2-Calculator 
    Complete CVSS v3 Guide:
        http://www.first.org/cvss/user-guide 
    On-line Calculator v3:
        http://www.first.org/cvss/calculator/3.0 
    IBM Java SDK Security Bulletin:
        http://www-01.ibm.com/support/docview.wss?uid=swg21974193


ACKNOWLEDGEMENTS:

    CVE-2015-7575 was reported to IBM by Karthikeyan Bhargavan at INRIA in
    Paris, France.


CHANGE HISTORY:

    First Issued: Thu Feb 25 08:44:57 CST 2016  

===============================================================================

*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact 
of this vulnerability in their environments by accessing the links in the 
Reference section of this Security Bulletin. 

Disclaimer
According to the Forum of Incident Response and Security Teams (FIRST), the 
Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVtPiR36ZAP0PgtI9AQLg7BAAl7jD2IiQ98JXekzRL6joNxmXDedLzRgl
haancBeIWYsM8A+xgknzqUxWcPb8Vg3EKzmvyWiMafyNPAOmnuam7brYzLpw9ZTt
0xl8QVqSaN4mKcMwnWq3J9Z3CrCcW8+Y7VjCN+jM3MOfG4aBHuuXSJRK7AE/AZVj
zglsMuqr895fp5poUa8U+oUBwOlTfz2Y7+nPg0dPelpkYgz79dtP/XM50tx1JVMw
bqezyjwn5dQv4RqIM+Zpavhd4fKHO0Y67nnpLV4jj9asYsFbETqBe3+ZOWdUkBmG
Y37Hp24BHFIElWdpKI/JawQ+bmh9iHZALcVjHgI6Cg6hay7BtiZFQ+eZKU4f/9Rm
Ub7s/PDprEGcDKZpmF8jGSYO8O0Iu2ocn9jrNxTNfIE/+8SgA1ezuIWYSHsiIyE/
AmIxLLxDWPNcr0OpZ/UnfMb5ZXgrpf6XsJeJgVM8VXb4dpwkxo2L5QBNUO4COADg
gDaWy5EVTXLsSj60wfBwF4iOEJ9gFF0pt9kOhqOrOhHuawbIwkEOTaqtx83IITbW
vgYgFb9RdbggWaa269/mvuWUpDeYlsyMrD/3duPKZ7eDPUYJBUR82IBrV/ANDTcy
CWywmR4e6iAd/5eDkuEKMRy4aRKLe0KoJETbtCMiJlPXaDRWAIhTPRmkGq1GbkYx
Dbeq55c6Iug=
=O3cl
-----END PGP SIGNATURE-----