Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2016.1267 Multiple vulnerabilities have been identified in IBM InfoSphere Streams 19 May 2016 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM InfoSphere Streams Publisher: IBM Operating System: Linux variants Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Increased Privileges -- Existing Account Denial of Service -- Remote/Unauthenticated Reduced Security -- Remote/Unauthenticated Access Confidential Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2016-2867 CVE-2016-2073 CVE-2016-0466 CVE-2016-0448 CVE-2016-0376 CVE-2016-0363 CVE-2015-8710 CVE-2015-8317 CVE-2015-1819 CVE-2013-5456 CVE-2013-3009 Reference: ASB-2016.0004 ESB-2016.1258 ESB-2016.1241 ESB-2013.1125 ESB-2013.1096 ESB-2013.1077 Original Bulletin: http://www-01.ibm.com/support/docview.wss?uid=swg21983371 http://www-01.ibm.com/support/docview.wss?uid=swg21983367 http://www-01.ibm.com/support/docview.wss?uid=swg21983436 http://www-01.ibm.com/support/docview.wss?uid=swg21983444 http://www-01.ibm.com/support/docview.wss?uid=swg21983370 http://www-01.ibm.com/support/docview.wss?uid=swg21981066 http://www-01.ibm.com/support/docview.wss?uid=swg21983372 Comment: This bulletin contains seven (7) IBM security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- Security Bulletin: Vulnerability in libxml2 affects IBM InfoSphere Streams. (CVE-2015-8710) Security Bulletin Document information More support for: IBM Streams Software version: 1.2, 2.0, 3.0, 3.1, 3.2, 3.2.1, 4.0, 4.0.1, 4.1, 4.1.1 Operating system(s): Linux Software edition: All Editions Reference #: 1983371 Modified date: 2016-05-18 Summary There is a vulnerability in libxml2 that is used by IBM InfoSphere Streams. IBM InfoSphere Streams has addressed this vulnerability. Vulnerability Details CVE-ID: CVE-2015-8710 Description: Libxml2 is vulnerable to a denial of service, caused by an out-of-bounds memory access when parsing an unclosed HTML comment. By using the ""<!--"" HTML comment without close, a remote attacker could exploit this vulnerability to trigger an out-of-bounds read and cause the system to crash. CVSS Base Score: 5.300 CVSS Temporal Score: https://exchange.xforce.ibmcloud.com/vulnerabilities/110076 for more information CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) Affected Products and Versions 1.2.1.0 2.0.0.4 and earlier 3.0.0.5 and earlier 3.1.0.7 and earlier 3.2.1.4 and earlier 4.0.1.1 and earlier 4.1.1.0 and earlier Remediation/Fixes NOTE: Fix Packs are available on IBM Fix Central. Version 4.1.1: Contact technical support. Version 4.0.1: Apply 4.0.1 Fix Pack 2 (4.0.1.2) or higher. Version 3.2.1: Apply 3.2.1 Fix Pack 5 (3.2.1.5) or higher. Version 3.1.0: Apply 3.1 Fix Pack 8 (3.1.0.8) or higher. Version 3.0.0: Apply 3.0 Fix Pack 6 (3.0.0.6) or higher. Versions 1.2 and 2.0 For version 1.x and 2.x IBM recommends upgrading to a fixed, supported version/release/platform of the product. Customers who cannot upgrade and need to secure their installation should open a PMR with IBM Technical Support and request assistance securing their InfoSphere Streams system against the vulnerabilities identified in this Security Bulletin. Workarounds and Mitigations None Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. References Complete CVSS v3 Guide On-line Calculator v3 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Change History 16 May 2016: Original version published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - -------------------------------------------------------------------------------- Security Bulletin: IBM InfoSphere Streams update of IBM SDK Java Technology Edition (CVE-2016-0363, CVE-2016-0376) Security Bulletin Document information More support for: IBM Streams Software version: 1.2, 2.0, 3.0, 3.1, 3.2, 3.2.1, 4.0, 4.0.1, 4.1, 4.1.1 Operating system(s): Linux Reference #: 1983367 Modified date: 2016-05-18 Summary There are multiple vulnerabilities in IBM SDK Java Technology Edition, Version 8 Service Refresh 2 Fix Pack 11 and earlier releases, Version 7R1 Service Refresh 3 Fix Pack 31 and earlier releases, and Version 6 Service Refresh 16 Fix Pack 21 and earlier releases provided with IBM InfoSphere streams. These issues were disclosed as part of the IBM Java SDK updates for April 2016. IBM InfoSphere Streams is providing an IBM Java SDK update that includes fixes for security vulnerabilities. If you run Java code using the IBM Java Runtime delivered with this product, you should evaluate your code to determine whether these vulnerabilities are applicable to your code. Vulnerability Details CVEID: CVE-2016-0363 DESCRIPTION: IBM SDK, Java Technology Edition contains a vulnerability in the IBM ORB implementation that may allow untrusted code running under a security manager to elevate its privileges. This vulnerability was originally reported as CVE-2013-3009. CVSS Base Score: 8.1 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/112016 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) CVEID: CVE-2016-0376 DESCRIPTION: A vulnerability in IBM Java SDK could allow a remote attacker to execute arbitrary code on the system. This vulnerability allows code running under a security manager to escalate its privileges by modifying or removing the security manager. This vulnerability was originally reported as CVE-2013-5456. CVSS Base Score: 8.1 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/112152 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) Affected Products and Versions 1.2.1.0 2.0.0.4 and earlier 3.0.0.6 and earlier 3.1.0.8 and earlier 3.2.1.4 and earlier 4.0.1.1 and earlier 4.1.1.0 and earlier Remediation/Fixes NOTE: Fix Packs are available on IBM Fix Central. Version 4.1.1: Contact Technical Support Version 4.0.1: Apply 4.0.1 Fix Pack 2 (4.0.1.2) or higher. Version 3.2.1: Apply 3.2.1 Fix Pack 5 (3.2.1.5) or higher. Versions 1.2, 2.0, 3.0, and 3.1: For version 1.x, 2.x, 3.x IBM recommends upgrading to a fixed, supported version/release/platform of the product. Customers who cannot upgrade and need to secure their installation should open a PMR with IBM Technical Support and request assistance securing their InfoSphere Streams system against the vulnerabilities identified in this Security Bulletin. IMPORTANT NOTE: If JAVA_HOME is set ensure it points to the install location of the upgraded IBM Developer Kit, Java. Applications compiled with JAVA_HOME set to a different location will need to be recompiled after JAVA_HOME has been changed. For more information on compiling with JAVA_HOME set see the Notes section on the page at the following URL: http://www-01.ibm.com/support/knowledgecenter/SSCRJU_4.0.0/com.ibm.streams.install.doc/doc/ibminfospherestreams-install-prerequisites-java-supported-sdks.html?lang=en Workarounds and Mitigations None Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. References Complete CVSS v3 Guide On-line Calculator v3 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Change History 16 May 2016: Original version published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - -------------------------------------------------------------------------------- Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM InfoSphere Streams (CVE-2016-0466, CVE-2016-0448) Security Bulletin Document information More support for: IBM Streams Software version: 1.2, 2.0, 3.0, 3.1, 3.2, 3.2.1, 4.0, 4.0.1, 4.1, 4.1.1 Operating system(s): Linux Software edition: All Editions Reference #: 1983436 Modified date: 2016-05-18 Summary There are multiple vulnerabilities in IBM SDK Java Technology Edition, Version 8 Service Refresh 2 Fix Pack 11 and earlier releases, Version 7R1 Service Refresh 3 Fix Pack 31 and earlier releases, and Version 6 Service Refresh 16 Fix Pack 21 and earlier releases. If you run your own Java code using the IBM Java Runtime delivered with this product, you should evaluate your code to determine whether the complete list of vulnerabilities are applicable to your code. For a complete list of vulnerabilities please refer to the Reference section for more information. Vulnerability Details CVEID: CVE-2016-0466 DESCRIPTION: An unspecified vulnerability in Oracle Java SE Java SE Embedded and Jrockit related to the JAXP component could allow a remote attacker to cause a denial of service resulting in a partial availability impact using unknown attack vectors. CVSS Base Score: 5 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/109948 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P) CVEID: CVE-2016-0448 DESCRIPTION: An unspecified vulnerability in Oracle Java SE and Java SE Embedded related to the JMX component could allow a remote attacker to obtain sensitive information resulting in a partial confidentiality impact using unknown attack vectors. CVSS Base Score: 4 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/109949 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N) Affected Products and Versions 1.2.1.0 2.0.0.4 and earlier 3.0.0.5 and earlier 3.1.0.7 and earlier 3.2.1.4 and earlier 4.0.1.1 and earlier 4.1.1.0 and earlier Remediation/Fixes NOTE: Fix Packs are available on IBM Fix Central. Version 4.1.1: Contact Technical Support Version 4.0.1: Apply 4.0.1 Fix Pack 2 (4.0.1.2) or higher. Version 3.2.1: Apply 3.2.1 Fix Pack 5 (3.2.1.5) or higher. Version 3.1.0: Apply 3.1 Fix Pack 8 (3.1.0.8) or higher. Version 3.0.0: Apply 3.0 Fix Pack 6 (3.0.0.6) or higher. Versions 1.2 and 2.0: For version 1.x and 2.x, IBM recommends upgrading to a fixed, supported version/release/platform of the product. Customers who cannot upgrade and need to secure their installation should open a PMR with IBM Technical Support and request assistance securing their InfoSphere Streams system against the vulnerabilities identified in this Security Bulletin. IMPORTANT NOTE: If JAVA_HOME is set ensure it points to the install location of the upgraded IBM Developer Kit, Java. Applications compiled with JAVA_HOME set to a different location will need to be recompiled after JAVA_HOME has been changed. For more information on compiling with JAVA_HOME set see the Notes section on the page at the following URL: http://www-01.ibm.com/support/knowledgecenter/SSCRJU_4.0.0/com.ibm.streams.install.doc/doc/ibminfospherestreams-install-prerequisites-java-supported-sdks.html?lang=en Workarounds and Mitigations None. Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. References Complete CVSS v3 Guide On-line Calculator v3 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Change History 17 May 2016: Original version published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - -------------------------------------------------------------------------------- Security Bulletin: A vulnerability in the instance runAsUser function was found in IBM InfoSphere Streams (CVE-2016-2867) Security Bulletin Document information More support for: IBM Streams Software version: 4.0, 4.0.1, 4.1, 4.1.1 Operating system(s): Linux Software edition: All Editions Reference #: 1983444 Modified date: 2016-05-18 Summary There is a potential vulnerability in IBM InfoSphere Streams when the instance runAsUser property is set. IBM InfoSphere Streams has addressed this vulnerability. Vulnerability Details CVEID: CVE-2016-2867 DESCRIPTION: In certain supported configurations of IBM InfoSphere Streams, setting the instance runAsUser property can result in operator code using the group id of the root user instead of the group id of the runAsUser for checking permissions. CVSS Base Score: 7.4 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/112763 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) Affected Products and Versions 4.0.1.1 and earlier 4.1.1.0 and earlier Remediation/Fixes NOTE: Fix Packs are available on IBM Fix Central. Version 4.1.1: Contact technical support. Version 4.0.1: Apply 4.0.1 Fix Pack 2 (4.0.1.2) or higher. Workarounds and Mitigations None Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. References Complete CVSS v3 Guide On-line Calculator v3 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Change History 20 May 2016: Original version published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - -------------------------------------------------------------------------------- Security Bulletin: Vulnerability in libxml2 affects IBM InfoSphere Streams. (CVE-2015-8317) Document information More support for: IBM Streams Software version: 1.2, 2.0, 3.0, 3.1, 3.2, 3.2.1, 4.0, 4.0.1, 4.1, 4.1.1 Operating system(s): Linux Software edition: All Editions Reference #: 1983370 Modified date: 2016-05-18 Security Bulletin Summary There is a vulnerability in libxml2 that is used by IBM InfoSphere Streams. IBM InfoSphere Streams has addressed this vulnerability. Vulnerability Details CVE-ID: CVE-2015-8317 Description: libxml2 is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by the xmlParseXMLDecl function. By using a malformed XML file, a local attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. CVSS Base Score: 5.900 CVSS Temporal Score: https://exchange.xforce.ibmcloud.com/vulnerabilities/108316 for more information CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) Affected Products and Versions 1.2.1.0 2.0.0.4 and earlier 3.0.0.5 and earlier 3.1.0.7 and earlier 3.2.1.4 and earlier 4.0.1.1 and earlier 4.1.1.0 and earlier Remediation/Fixes NOTE: Fix Packs are available on IBM Fix Central. Version 4.1.1: Contact technical support. Version 4.0.1: Apply 4.0.1 Fix Pack 2 (4.0.1.2) or higher. Version 3.2.1: Apply 3.2.1 Fix Pack 5 (3.2.1.5) or higher. Version 3.1.0: Apply 3.1 Fix Pack 8 (3.1.0.8) or higher. Version 3.0.0: Apply 3.0 Fix Pack 6 (3.0.0.6) or higher. Versions 1.2 and 2.0: For version 1.x and 2.x IBM recommends upgrading to a fixed, supported version/release/platform of the product. Customers who cannot upgrade and need to secure their installation should open a PMR with IBM Technical Support and request assistance securing their InfoSphere Streams system against the vulnerabilities identified in this Security Bulletin. Workarounds and Mitigations None Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. References Complete CVSS v3 Guide On-line Calculator v3 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Change History 16 May 2016: Original version published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - -------------------------------------------------------------------------------- Security Bulletin: A vulnerability in XML processing affects IBM InfoSphere Streams (CVE-2015-1819) Security Bulletin Document information More support for: IBM Streams Software version: 1.2, 2.0, 3.0, 3.1, 3.2.1, 4.0.1, 4.1.1 Operating system(s): Linux Reference #: 1981066 Modified date: 2016-05-18 Summary IBM InfoSphere Streams may be vulnerable to a denial of service attack due to the use of Libxml2 (CVE-2015-1819) Vulnerability Details CVEID:CVEID: CVE-2015-1819 DESCRIPTION: Libxml is vulnerable to a denial of service, caused by an XML External Entity Injection (XXE) error in the xmlreader when processing XML data. A remote attacker could exploit this vulnerability to consume all available memory resources. CVSS Base Score: 5.3 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/107272 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) Affected Products and Versions 1.2.1.0 2.0.0.4 and earlier 3.0.0.5 and earlier 3.1.0.7 and earlier 3.2.1.4 and earlier 4.0.1.1 and earlier 4.1.1.0 and earlier Remediation/Fixes NOTE: Fix Packs are available on IBM Fix Central. Version 4.1.1: Contact technical support. Version 4.0.1: Apply 4.0.1 Fix Pack 2 (4.0.1.2) or higher. Version 3.2.1: Apply 3.2.1 Fix Pack 5 (3.2.1.5) or higher. Version 3.1.0: Apply 3.1 Fix Pack 8 (3.1.0.8) or higher. Version 3.0.0: Apply 3.0 Fix Pack 6 (3.0.0.6) or higher. Versions 1.2 and 2.0: For version 1.x and 2.x IBM recommends upgrading to a fixed, supported version/release/platform of the product. Customers who cannot upgrade and need to secure their installation should open a PMR with IBM Technical Support and request assistance securing their InfoSphere Streams system against the vulnerabilities identified in this Security Bulletin. Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. References Complete CVSS v3 Guide On-line Calculator v3 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Change History 16 May 2016 Original version published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - -------------------------------------------------------------------------------- Security Bulletin: Vulnerability in libxml2 affects IBM InfoSphere Streams. (CVE-2016-2073) Security Bulletin Document information More support for: IBM Streams Software version: 1.2, 2.0, 3.0, 3.1, 3.2, 3.2.1, 4.0, 4.0.1, 4.1, 4.1.1 Operating system(s): Linux Software edition: All Editions Reference #: 1983372 Modified date: 2016-05-18 Summary There is a vulnerability in libxml2 that is used by IBM InfoSphere Streams. IBM InfoSphere Streams has addressed this vulnerability. Vulnerability Details CVE-ID: CVE-2016-2073 Description: libxml2 is vulnerable to a heap-based buffer overflow, caused by an out-of-bounds read in the htmlParseNameComplex() function. By persuading a victim to open a specially crafted XML file, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. CVSS Base Score: 6.300 CVSS Temporal Score: https://exchange.xforce.ibmcloud.com/vulnerabilities/110307 for more information CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) Affected Products and Versions 1.2.1.0 2.0.0.4 and earlier 3.0.0.5 and earlier 3.1.0.7 and earlier 3.2.1.4 and earlier 4.0.1.1 and earlier 4.1.1.0 and earlier Remediation/Fixes NOTE: Fix Packs are available on IBM Fix Central. Version 4.1.1: Contact technical support. Version 4.0.1: Apply 4.0.1 Fix Pack 2 (4.0.1.2) or higher. Version 3.2.1: Apply 3.2.1 Fix Pack 5 (3.2.1.5) or higher. Version 3.1.0: Apply 3.1 Fix Pack 8 (3.1.0.8) or higher. Version 3.0.0: Apply 3.0 Fix Pack 6 (3.0.0.6) or higher. Versions 1.2 and 2.0 For version 1.x and 2.x IBM recommends upgrading to a fixed, supported version/release/platform of the product. Customers who cannot upgrade and need to secure their installation should open a PMR with IBM Technical Support and request assistance securing their InfoSphere Streams system against the vulnerabilities identified in this Security Bulletin. Workarounds and Mitigations None Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. References Complete CVSS v3 Guide On-line Calculator v3 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Change History 16 May 2016: Original version published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVz0+X36ZAP0PgtI9AQKs4g/8DlpXFI00V5o5g4qo5cbPUqM50m12fShW DAgMrM5L7wXsXYVhLNom5l46mR0sPThoEHUAey7w8+FwYkECLTUxqbfzF9Et2Xz+ Ml5Q0dSvCUnRsJP19b0EH/tIwP+JD0sXhY4ZPO4Gi5oUcbOWrbd/m0D7PpiwKcPH wbyiS5GYtHPFWCOdmeat1eKaEAVN1zf2LH+qeoeQ60K45Nbbx9M/pZT3f8EVCUlm gtPFc7Z0HQ6O75Pxek3zicP50exjgN92uEzxUVHnLzaYleP89RvNhPCQdD/PN+S1 adm2F6dUBU3I+1CsZMcwdVFtovJm2dMf/5EuSO1AOEZRz8wzA/pjTfe36z3Vr3CG I+XnEkjRXkp83gdW/JR11JG80aTRbuGU1nk5RpOdT219nBpUj/wL5o9i8nojbAMP LF6l7pr7xHzooENNtPcnoG0n244+hANgDzeBO4lSX8CmXq1UkwbJ90vkbUjNSKFE RDu6Eipu4R0uZdtcppA8xd9B2OCkmwu7sS+vU27AlE1Oe6PTO3zfK82Eb3LJOKXc 8pmiBfbylB5v1meSRnovLihUbwAQxjKCu1Hs+TCu3BQTkrBC7Vjh85ijdNSfDwZs dVIAXC8i7TyXzIASV3u6YqmHxgWfQyNLNvNGWo1oKISYirGl1VOSn/Qg2lLnhCX3 XvzBTrsmfsA= =/Cvy -----END PGP SIGNATURE-----