-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.2174
 Security Bulletin: Multiple security vulnerabilities have been identified
   in IBM WebSphere Application Server shipped with IBM Tivoli Federated
Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway
                             15 September 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Tivoli Federated Identity Manager
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   Linux variants
                   Solaris
                   Windows
                   z/OS
Impact/Access:     Cross-site Request Forgery -- Remote with User Interaction
                   Access Confidential Data   -- Existing Account            
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-0385 CVE-2016-0377 

Reference:         ESB-2016.2130
                   ESB-2016.2121
                   ESB-2016.1980

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=swg21989927
   http://www.ibm.com/support/docview.wss?uid=swg21989925

Comment: This bulletin contains two (2) IBM security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: A security vulnerability has been identified in IBM
WebSphere Application Server shipped with IBM Tivoli Federated Identity
Manager and IBM Tivoli Federated Identity Manager Business Gateway
(CVE-2016-0377)

Security Bulletin

Document information

More support for:

Tivoli Federated Identity Manager

Software version:

6.2.1, 6.2.2

Operating system(s):

Platform Independent

Reference #:

1989927

Modified date:

2016-09-15

Summary

IBM WebSphere Application Server is shipped as a component of IBM Tivoli
Federated Identity Manager and IBM Tivoli Federated Identity Manager Business
Gateway. Information about a security vulnerability affecting IBM WebSphere
Application Server has been published in a security bulletin.

Vulnerability Details

Please consult the security bulletin

Security Bulletin: Information Disclosure in IBM WebSphere Application Server
(CVE-2016-0377)

for vulnerability details and information about fixes.

Affected Products and Versions

Principal Product and Version(s)                              Affected Supporting Product and Version
IBM Tivoli Federated Identity Manager 6.2.1                   IBM WebSphere Application Server 7.0
IBM Tivoli Federated Identity Manager Business Gateway 6.2.1
IBM Tivoli Federated Identity Manager 6.2.2                   IBM WebSphere Application Server 7.0, 8.0, 8.5
IBM Tivoli Federated Identity Manager Business Gateway 6.2.2

Remediation/Fixes

IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity
Manager Business Gateway are affected through IBM WebSphere Application
Server. If you use one of the affected versions of WebSphere, update your IBM
WebSphere Application Server SDK with the appropriate Interim Fix based on
information in the WebSphere security bulletin

Security Bulletin: Information Disclosure in IBM WebSphere Application Server
(CVE-2016-0377)

.

Workarounds and Mitigations

None.

Get Notified about Future Security Bulletins

Subscribe to

My Notifications

to be notified of important product support alerts like this.

References

Complete CVSS v3 Guide

On-line Calculator v3

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

Security Bulletin: Information Disclosure in IBM WebSphere Application Server
(CVE-2016-0377)

Change History

September 15, 2016: Original version published.

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.


- ---

Security Bulletin:  security vulnerability has been identified in IBM
WebSphere Application Server shipped with IBM Tivoli Federated Identity
Manager and IBM Tivoli Federated Identity Manager Business Gateway
(CVE-2016-0385)

Security Bulletin

Document information

More support for:

Tivoli Federated Identity Manager

Software version:

6.2.1, 6.2.2

Operating system(s):

Platform Independent

Reference #:

1989925

Modified date:

2016-09-15

Summary

IBM WebSphere Application Server is shipped as a component of IBM Tivoli
Security Policy Manager. Information about a security vulnerability affecting
IBM WebSphere Application Server has been published in a security bulletin.

Vulnerability Details

Please consult the security bulletin

Bypass security restrictions in WebSphere Application Server (CVE-2016-0385)

for vulnerability details and information about fixes.

Affected Products and Versions

Principal Product and Version(s)                              Affected Supporting Product and Version
IBM Tivoli Federated Identity Manager 6.2.1                   IBM WebSphere Application Server 7.0
IBM Tivoli Federated Identity Manager Business Gateway 6.2.1
IBM Tivoli Federated Identity Manager 6.2.2                   IBM WebSphere Application Server 7.0, 8.0, 8.5
IBM Tivoli Federated Identity Manager Business Gateway 6.2.2

Remediation/Fixes

IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity
Manager Business Gateway are affected through IBM WebSphere Application
Server. If you use one of the affected versions of WebSphere, update your IBM
WebSphere Application Server SDK with the appropriate Interim Fix based on
information in the WebSphere security bulletin

Bypass security restrictions in WebSphere Application Server (CVE-2016-0385)

Workarounds and Mitigations

None.

Get Notified about Future Security Bulletins

Subscribe to

My Notifications

to be notified of important product support alerts like this.

References

Complete CVSS v3 Guide

On-line Calculator v3

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

Bypass security restrictions in WebSphere Application Server (CVE-2016-0385)

Change History

September 15, 2016: Original version published.

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=6GqG
-----END PGP SIGNATURE-----