-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.0680
       Security Bulletin: Vulnerabilities in GNU C library (glibc),
            OpenSSL and BIND affect IBM Netezza Host Management
                               14 March 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Netezza Host Management
Publisher:         IBM
Operating System:  Network Appliance
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                   Denial of Service               -- Remote/Unauthenticated      
                   Provide Misleading Information  -- Remote with User Interaction
                   Unauthorised Access             -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-0701 CVE-2015-8704 CVE-2015-7547
                   CVE-2015-3197  

Reference:         ASB-2016.0020
                   ASB-2016.0017
                   ESB-2016.0419.2
                   ESB-2016.0417
                   ESB-2016.0406
                   ESB-2016.0394
                   ESB-2016.0387
                   ESB-2016.0279
                   ESB-2016.0251
                   ESB-2016.0250
                   ESB-2016.0193
                   ESB-2016.0156
                   ESB-2016.0138
                   ESB-2016.0135

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=swg21976444

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Vulnerabilities in GNU C library (glibc), OpenSSL and BIND
affect IBM Netezza Host Management

Security Bulletin

Document information

More support for:

PureData System for Analytics

Software version:

1.0.0

Operating system(s):

Platform Independent

Software edition:

All Editions

Reference #:

1976444

Modified date:

2016-03-11

Summary

Vulnerabilites in GNU C library (glibc), OpenSSL and BIND affects IBM Netezza
Host Management. IBM Netezza Host Management has addressed the applicable
CVEs.

Vulnerability Details

CVEID:

CVE-2015-7547

DESCRIPTION:

GNU C Library (glibc) is vulnerable to a stack-based buffer overflow, caused
by improper bounds checking by the nss_dns backend for the getaddrinfo()
function when performing dual A/AAAA DNS queries. By sending a specially
crafted DNS response, a remote attacker could overflow a buffer and execute
arbitrary code on the system or cause the application to crash.

CVSS Base Score: 8.1

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/110662

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID:

CVE-2016-0701

DESCRIPTION:

OpenSSL could allow a remote attacker to conduct man-in-the-middle attacks,
caused by the use of weak Diffie-Hellman parameters based on unsafe primes
that are generated and stored in X9.42-style parameter files. By performing
multiple handshakes using the same private DH exponent, an attacker could
exploit this vulnerability to conduct man-in-the-middle attacks.

CVSS Base Score: 5.4

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/110234

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N)

CVEID:

CVE-2015-3197

DESCRIPTION:

OpenSSL could allow a remote attacker to conduct man-in-the-middle attacks,
caused by an error related to the negotiation of disabled SSLv2 ciphers by
malicious SSL/TLS clients. An attacker could exploit this vulnerability to
conduct man-in-the-middle attacks.

CVSS Base Score: 5.4

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/110235

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N)

CVEID:

CVE-2015-8704

DESCRIPTION:

ISC BIND is vulnerable to a denial of service, caused by improper bounds
checking in apl_42.c. By sending specially crafted Address Prefix List (APL)
data, a remote authenticated attacker could exploit this vulnerability to
trigger an INSIST assertion failure and cause the named process to terminate.

CVSS Base Score: 6.5

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/109701

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

IBM Netezza Host Management 5.4.2.0 (and prior releases)

Remediation/Fixes

IBM Netezza Host Management 5.4.3.0

Link to Fix Central

For

IBM Netezza Host Management prior to the above mention releases,

IBM recommends upgrading to a fixed, supported version/release/platform of
the product.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to

My Notifications

to be notified of important product support alerts like this.

References

Complete CVSS v3 Guide

On-line Calculator v3

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

Acknowledgement

None

Change History

11 March 2016 Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=XeG7
-----END PGP SIGNATURE-----