-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.0876
 Security Bulletin: Multiple vulnerabilities affect IBM Security Guardium
                               8 April 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Security Guardium
Publisher:         IBM
Operating System:  Linux variants
Impact/Access:     Access Privileged Data         -- Remote/Unauthenticated      
                   Modify Arbitrary Files         -- Existing Account            
                   Denial of Service              -- Remote/Unauthenticated      
                   Provide Misleading Information -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-0800 CVE-2016-0611 CVE-2016-0610
                   CVE-2016-0609 CVE-2016-0608 CVE-2016-0607
                   CVE-2016-0606 CVE-2016-0600 CVE-2016-0598
                   CVE-2016-0597 CVE-2016-0596 CVE-2016-0595
                   CVE-2016-0546 CVE-2016-0505 CVE-2016-0504
                   CVE-2016-0503 CVE-2015-8242 CVE-2015-8241
                   CVE-2015-7942 CVE-2015-7575 CVE-2015-3196
                   CVE-2015-3195 CVE-2015-3194 

Reference:         ASB-2016.0004
                   ESB-2015.3042

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=swg21978004
   http://www.ibm.com/support/docview.wss?uid=swg21978207
   http://www.ibm.com/support/docview.wss?uid=swg21978016
   http://www.ibm.com/support/docview.wss?uid=swg21978817
   http://www.ibm.com/support/docview.wss?uid=swg21978018

Comment: This bulletin contains five (5) IBM security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin:  Multiple vulnerabilities in IBM Java SDK affect IBM
Security Guardium (CVE-2015-7575)

Security Bulletin

Document information

More support for:

IBM Security Guardium

Software version:

9.0, 9.1, 9.5, 10.0

Operating system(s):

Linux

Reference #:

1978004

Modified date:

2016-04-01

Summary

There are multiple vulnerabilities in IBM SDK Java Technology Edition,
Versions 6 and 7 that is used by IBM Security Guardium. These issues were
disclosed as part of the IBM Java SDK updates in January 2016 and includes
the vulnerability commonly referred to as SLOTH.

Vulnerability Details

CVEID:

CVE-2015-7575

DESCRIPTION:

The TLS protocol could allow weaker than expected security caused by a
collision attack when using the MD5 hash function for signing a
ServerKeyExchange message during a TLS handshake. An attacker could exploit
this vulnerability using man-in-the-middle techniques to impersonate a TLS
server and obtain credentials. This vulnerability is commonly referred to as
SLOTH.

CVSS Base Score: 7.1

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/109415

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/UI:U/C:H/I:L/A:N)

Affected Products and Versions

IBM Security Guardium 9x, 10

Remediation/Fixes

Product                VRMF    APAR         Remediation/First Fix
IBM Security Guardium  9x      PSIRT 69377  http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EInformation%2BManagement&product=ibm/Information+Management/InfoSphere+Guardium&release=All&platform=All&function=fixId&fixids=SqlGuard_9.0p6019_SecurityUpdate&includeSupersedes=0&source=fc
IBM Security Guardium  10      PSIRT 69377  http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EInformation%2BManagement&product=ibm/Information+Management/InfoSphere+Guardium&release=All&platform=All&function=fixId&fixids=SqlGuard_10.0p6019_SecurityUpdate&includeSupersedes=0&source=fc

Get Notified about Future Security Bulletins

Subscribe to

My Notifications

to be notified of important product support alerts like this.

References

Complete CVSS v2 Guide

On-line Calculator v2

Complete CVSS v3 Guide

On-line Calculator v3

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

Acknowledgement

CVE-2015-7575 was reported to IBM by Karthikeyan Bhargavan at INRIA in Paris,
France

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- ---

Security Bulletin: IBM Security Guardium is affected by OpenSource Oracle
MySQL Vulnerability (multiple CVEs)

Security Bulletin

Document information

More support for:

IBM Security Guardium

Software version:

9.0, 9.1, 9.5, 10.0

Operating system(s):

Linux

Reference #:

1978207

Modified date:

2016-04-01

Summary

IBM Security Guardium is affected by unspecified vulnerabilities in Oracle
MySQL Server

Vulnerability Details

CVEID:

CVE-2016-0503

DESCRIPTION:

An unspecified vulnerability in Oracle MySQL Server related to the "Server:
DML" component could allow a remote attacker to cause a denial of service.

CVSS Base Score: 4

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/109978

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P)

CVEID:

CVE-2016-0504

DESCRIPTION:

An unspecified vulnerability in Oracle MySQL Server related to the "Server:
DML" component could allow a remote attacker to cause a denial of service.

CVSS Base Score: 6.8

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/109974

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:C)

CVEID:

CVE-2016-0505

DESCRIPTION:

An unspecified vulnerability in Oracle MySQL Server related to the "Server:
Options" component could allow a remote attacker to cause a denial of
service.

CVSS Base Score: 6.8

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/109975

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:C)

CVEID:

CVE-2016-0546

DESCRIPTION:

An unspecified vulnerability in Oracle MySQL Server related to the Client
component could allow a local attacker to execute arbitrary code on the
system with elevated privileges.

CVSS Base Score: 7.2

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/109973

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVEID:

CVE-2016-0595

DESCRIPTION:

An unspecified vulnerability in Oracle MySQL Server related to the "Server:
DML" component could allow a remote attacker to cause a denial of service.

CVSS Base Score: 4

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/109977

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P)

CVEID:

CVE-2016-0596

DESCRIPTION:

An unspecified vulnerability in Oracle MySQL Server related to the "Server:
DML" component could allow a remote attacker to cause a denial of service.

CVSS Base Score: 4

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/109979

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P)

CVEID:

CVE-2016-0597

DESCRIPTION:

An unspecified vulnerability in Oracle MySQL Server related to the "Server:
Optimizer" component could allow a remote attacker to cause a denial of
service.

CVSS Base Score: 4

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/109981

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P)

CVEID:

CVE-2016-0598

DESCRIPTION:

An unspecified vulnerability in Oracle MySQL Server related to the "Server:
DML" component could allow a remote attacker to cause a denial of service.

CVSS Base Score: 3.5

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/109984

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:N/A:P)

CVEID:

CVE-2016-0600

DESCRIPTION:

An unspecified vulnerability in Oracle MySQL Server related to the "Server:
InnoDB" component could allow a remote attacker to cause a denial of service.

CVSS Base Score: 3.5

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/109985

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:N/A:P)

CVEID:

CVE-2016-0606

DESCRIPTION:

An unspecified vulnerability in Oracle MySQL Server related to the "Server:
Security: Encryption" component has no confidentiality impact, partial
integrity impact, and no availability impact.

CVSS Base Score: 3.5

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/109989

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N)

CVEID:

CVE-2016-0607

DESCRIPTION:

An unspecified vulnerability in Oracle MySQL Server related to the "Server:
Replication" component could allow a remote attacker to cause a denial of
service.

CVSS Base Score: 2.8

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/109991

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:M/Au:M/C:N/I:N/A:P)

CVEID:

CVE-2016-0608

DESCRIPTION:

An unspecified vulnerability in Oracle MySQL Server related to the "Server:
UDF" component could allow a remote attacker to cause a denial of service.

CVSS Base Score: 3.5

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/109990

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:N/A:P)

CVEID:

CVE-2016-0609

DESCRIPTION:

An unspecified vulnerability in Oracle MySQL Server related to the "Server:
Security: Privileges" component could allow a remote attacker to cause a
denial of service.

CVSS Base Score: 1.7

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/109994

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:H/Au:M/C:N/I:N/A:P)

CVEID:

CVE-2016-0610

DESCRIPTION:

An unspecified vulnerability in Oracle MySQL Server related to the "Server:
InnoDB" component could allow a remote attacker to cause a denial of service.

CVSS Base Score: 3.5

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/109986

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:N/A:P)

CVEID:

CVE-2016-0611

DESCRIPTION:

An unspecified vulnerability in Oracle MySQL Server related to the "Server:
Optimizer" component could allow a remote attacker to cause a denial of
service.

CVSS Base Score: 4

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/109982

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P)

Affected Products and Versions

IBM Security Guardium 9.0, 9.1, 9.5, 10

Remediation/Fixes

VRMF                   APAR  Remediation/First Fix
IBM Security Guardium  9x    PSIRT 69817 	    http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EInformation%2BManagement&product=ibm/Information+Management/InfoSphere+Guardium&release=All&platform=All&function=fixId&fixids=SqlGuard_9.0p6019_SecurityUpdate&includeSupersedes=0&source=fc
                       
IBM Security Guardium  10    PSIRT 69817            http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EInformation%2BManagement&product=ibm/Information+Management/InfoSphere+Guardium&release=All&platform=All&function=fixId&fixids=SqlGuard_10.0p6019_SecurityUpdate&includeSupersedes=0&source=fc
                       
Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to

My Notifications

to be notified of important product support alerts like this.

References

Complete CVSS v2 Guide

On-line Calculator v2

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

Change History

Provided more details on versions affected

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- ---

Security Bulletin: IBM Security Guardium Database Activity Monitor is
affected by OpenSource LibXML2 and LibXML Vulnerability (CVE-2015-7942
CVE-2015-8241 CVE-2015-8242)

Security Bulletin

Document information

More support for:

IBM Security Guardium

Software version:

10.0

Operating system(s):

Linux

Reference #:

1978016

Modified date:

2016-04-01

Summary

libxml2 is vulnerable to a stack-based buffer overflow, denial of service and
a buffer overflow

Vulnerability Details

CVEID:

CVE-2015-8242

DESCRIPTION:

libxml2 is vulnerable to a stack-based buffer overflow, caused by improper
bounds checking by the HTML parser in push mode in xmlSAX2TextNode. By using
a malformed XML file, a local attacker could overflow a buffer and execute
arbitrary code on the system or cause the application to crash.

CVSS Base Score: 5.9

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/108170

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

CVEID:

CVE-2015-7942

DESCRIPTION:

Libxml2 is vulnerable to a denial of service, caused by a heap-based buffer
overflow in the xmlParseConditionalSections function. By using a specially-
crafted XML data, a remote attacker could exploit this vulnerability to
trigger an out-of-bounds read and cause the system to crash.

CVSS Base Score: 4.3

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/108073

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)

CVEID:

CVE-2015-8241

DESCRIPTION:

libxml2 is vulnerable to a buffer overflow, caused by improper bounds
checking by the XML parser in xmlNextChar. By using a malformed XML file, a
local attacker could overflow a buffer and execute arbitrary code on the
system or cause the application to crash.

CVSS Base Score: 5.9

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/108169

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

Affected Products and Versions

IBM Security Guardium Database Activity Monitor V10

Remediation/Fixes

Product                                            VRMF  APAR         Remediation/First Fix
IBM Security Guardium Database Activity Monitor    10    PSIRT 66222  http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EInformation%2BManagement&product=ibm/Information+Management/InfoSphere+Guardium&release=All&platform=All&function=fixId&fixids=SqlGuard_10.0p6019_SecurityUpdate&includeSupersedes=0&source=fc

Get Notified about Future Security Bulletins

Subscribe to

My Notifications

to be notified of important product support alerts like this.

References

Complete CVSS v3 Guide

On-line Calculator v3

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- ---

Security Bulletin: Multiple vulnerabilities in OpenSSL affect IBM Security
Guardium

Security Bulletin

Document information

More support for:

IBM Security Guardium

Software version:

8.2, 9.0, 9.1, 9.5, 10.0

Operating system(s):

Linux

Reference #:

1978817

Modified date:

2016-04-01

Summary

OpenSSL vulnerabilities were disclosed on March 1, 2016 by the OpenSSL
Project. OpenSSL is used by IBM Security Guardium. IBM Security Guardium has
addressed the applicable CVEs including the DROWN: Decrypting RSA with
Obsolete and Weakened eNcryption" vulnerability.

Vulnerability Details

CVEID:

CVE-2016-0800

DESCRIPTION:

OpenSSL could allow a remote attacker to bypass security restrictions. By
using a server that supports SSLv2 and EXPORT cipher suites as a
Bleichenbacher RSA padding oracle, an attacker could exploit this
vulnerability to decrypt TLS sessions between clients and non-vulnerable
servers. This vulnerability is also known as the DROWN attack.

CVSS Base Score: 7.4

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/111139

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)

Affected Products and Versions

IBM Security Guardium 8.2, 9.0, 9.1, 9.5, 10.0

Remediation/Fixes

Product                VRMF    APAR         Remediation/First Fix
IBM Security Guardium  8.2     PSIRT 72364  http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EInformation%2BManagement&product=ibm/Information+Management/InfoSphere+Guardium&release=All&platform=All&function=fixId&fixids=SqlGuard_8.2p6019_SecurityUpdate&includeSupersedes=0&source=fc
IBM Security Guardium  9x      PSIRT 72364  http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EInformation%2BManagement&product=ibm/Information+Management/InfoSphere+Guardium&release=All&platform=All&function=fixId&fixids=SqlGuard_9.0p6019_SecurityUpdate&includeSupersedes=0&source=fc
IBM Security Guardium  10      PSIRT 72364  http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EInformation%2BManagement&product=ibm/Information+Management/InfoSphere+Guardium&release=All&platform=All&function=fixId&fixids=SqlGuard_10.0p6019_SecurityUpdate&includeSupersedes=0&source=fc

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to

My Notifications

to be notified of important product support alerts like this.

References

Complete CVSS v2 Guide

On-line Calculator v2

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- ---

Security Bulletin: : Vulnerabilities in OpenSSL affect IBM Security Guardium
(CVE-2015-3194, CVE-2015-3195, CVE-2015-3196)

Security Bulletin

Document information

More support for:

IBM Security Guardium

Software version:

8.2, 9.0, 9.1, 9.5, 10.0

Operating system(s):

Linux

Reference #:

1978018

Modified date:

2016-04-01

Summary

OpenSSL vulnerabilities were disclosed on December 3, 2015 by the OpenSSL
Project. OpenSSL is used by IBM Security Guardium. IBM Security Guardium has
addressed the applicable CVEs.

Vulnerability Details

CVEID:

CVE-2015-3194

DESCRIPTION:

OpenSSL is vulnerable to a denial of service, caused by a NULL pointer
dereference when verifying certificates via a malformed routine. An attacker
could exploit this vulnerability using signature verification routines with
an absent PSS parameter to cause any certificate verification operation to
crash.

CVSS Base Score: 5.3

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/108503

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID:

CVE-2015-3195

DESCRIPTION:

OpenSSL could allow a remote attacker to obtain sensitive information, caused
by a memory leak in a malformed X509_ATTRIBUTE structure. An attacker could
exploit this vulnerability to obtain CMS data and other sensitive
information.

CVSS Base Score: 5.3

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/108504

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID:

CVE-2015-3196

DESCRIPTION:

OpenSSL is vulnerable to a denial of service, caused by a race condition when
PSK identity hints are received by a multi-threaded client and the SSL_CTX
structure is updated with the incorrect value. An attacker could exploit this
vulnerability to possibly corrupt memory and cause a denial of service.

CVSS Base Score: 3.7

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/108505

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

Affected Products and Versions

IBM Security Guardium 8.2, 9x, 10

Remediation/Fixes

Product                VRMF    APAR         Remediation/First Fix
IBM Security Guardium  8.2     PSIRT 66524  http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EInformation%2BManagement&product=ibm/Information+Management/InfoSphere+Guardium&release=All&platform=All&function=fixId&fixids=SqlGuard_8.2p6019_SecurityUpdate&includeSupersedes=0&source=fc
IBM Security Guardium  9x      PSIRT 66524  http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EInformation%2BManagement&product=ibm/Information+Management/InfoSphere+Guardium&release=All&platform=All&function=fixId&fixids=SqlGuard_9.0p6019_SecurityUpdate&includeSupersedes=0&source=fc
IBM Security Guardium  10      PSIRT 66524  http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EInformation%2BManagement&product=ibm/Information+Management/InfoSphere+Guardium&release=All&platform=All&function=fixId&fixids=SqlGuard_10.0p6019_SecurityUpdate&includeSupersedes=0&source=fc

Get Notified about Future Security Bulletins

Subscribe to

My Notifications

to be notified of important product support alerts like this.

References

Complete CVSS v2 Guide

On-line Calculator v2

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=k17R
-----END PGP SIGNATURE-----