-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.1979
               Security Bulletin: Multiple Denial of Service
           vulnerabilities with Expat may affect IBM HTTP Server
                              17 August 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM HTTP Server
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   IBM i
                   Linux variants
                   Solaris
                   Windows
                   z/OS
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-4472 CVE-2016-0718 CVE-2012-1148
                   CVE-2012-0876  

Reference:         ASB-2016.0081
                   ESB-2012.0552

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=swg21988026

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Multiple Denial of Service vulnerabilities with Expat may
affect IBM HTTP Server

Security Bulletin

Document information

More support for:

IBM HTTP Server

Software version:

7.0, 8.0, 8.5, 8.5.5, 9.0

Operating system(s):

AIX, HP-UX, IBM i, Linux, Solaris, Windows, z/OS

Software edition:

All Editions

Reference #:

1988026

Modified date:

2016-08-16

Summary

There are several vulnerabilities that may affect IBM HTTP Server that is
used by WebSphere Application Server.

Vulnerability Details

CVEID:

CVE-2012-0876

DESCRIPTION:

Expat is vulnerable to a denial of service, caused by insufficient
randomization of hash data structures. By sending multiple specially-crafted
HTTP POST requests to an affected application containing conflicting hash key
values, a remote attacker could exploit this vulnerability to cause the
consumption of CPU resources.

CVSS Base Score: 5

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/73868

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVEID:

CVE-2012-1148

DESCRIPTION:

Expat is vulnerable to a denial of service, caused by a memory leak in
poolGrow when handling XML data. A remote attacker could exploit this
vulnerability to cause the application using the vulnerable XML parsing
library to crash.

CVSS Base Score: 5

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/73867

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVEID:

CVE-2016-4472

DESCRIPTION:

Expat XML parser is vulnerable to a denial of service, caused by the removal
by compilers with certain optimization settings. By using a specially-crafted
XML data, a remote attacker could exploit this vulnerability to cause the
application to crash.

CVSS Base Score: 5.3

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/114683

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID:

CVE-2016-0718

DESCRIPTION:

Expat XML parser is vulnerable to a denial of service, caused by an out-of-
bounds read within XML parser. By using a specially-crafted file, a remote
attacker could exploit this vulnerability to cause the application to crash.

CVSS Base Score: 5.3

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/113408

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

Affected Products and Versions

These vulnerabilities affects the following versions and releases of IBM HTTP
Server (powered by Apache) component in all editions of WebSphere Application
Server and bundling products.

Version 9.0

Version 8.5.5

Version 8.5

Version 8.0

Version 7.0

Remediation/Fixes

For affected IBM HTTP Server for WebSphere Application Server:

The recommended solution is to apply the interim fix, Fix Pack or PTF
containing APAR PI66849 for each named product as soon as practical.

For V9.0.0.0 through 9.0.0.1:

 Apply Interim Fix

PI66849

- --OR--

 Apply Fix Pack 9.0.0.2 or later (targeted availability 09 December 2016).

For V8.5.0.0 through 8.5.5.10:

 Upgrade to minimum fix pack levels as required by interim fix and then apply
Interim Fix

PI66849

- --OR--

 Apply Fix Pack 8.5.5.11 or later (targeted availability 20 February 2017).

For V8.0.0.0 through 8.0.0.12:

 Upgrade to minimum fix pack levels as required by interim fix and then apply
Interim Fix

PI66849

- --OR--

 Apply Fix Pack 8.0.0.13 or later (targeted availability 24 October 2016).

For V7.0.0.0 through 7.0.0.41:

 Upgrade to minimum fix pack levels as required by interim fix and then apply
Interim Fix

PI66849

- --OR--

 Apply Fix Pack 7.0.0.43 or later (targeted availability 2Q2017).

Get Notified about Future Security Bulletins

Subscribe to

My Notifications

to be notified of important product support alerts like this.

References

Complete CVSS v2 Guide

On-line Calculator v2

Complete CVSS v3 Guide

On-line Calculator v3

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

Change History

16 August 2016: original document published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=hmxw
-----END PGP SIGNATURE-----