-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.2543
        Security Bulletin: Multiple Security Vulnerabilities exist
                          in IBM Cognos Express.
                              31 October 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Cognos Express
Publisher:         IBM
Operating System:  Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                   Access Privileged Data          -- Remote/Unauthenticated      
                   Denial of Service               -- Remote/Unauthenticated      
                   Provide Misleading Information  -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-3427 CVE-2016-2842 CVE-2016-2176
                   CVE-2016-2107 CVE-2016-0799 CVE-2016-0705
                   CVE-2016-0702 CVE-2016-0466 CVE-2016-0448
                   CVE-2015-5006 CVE-2015-4911 CVE-2015-4893
                   CVE-2015-4803 CVE-2015-3197 CVE-2015-3196
                   CVE-2015-3195 CVE-2015-3194 CVE-2015-3193
                   CVE-2015-1794  

Reference:         ASB-2016.0095
                   ASB-2016.0087
                   ASB-2016.0074
                   ASB-2016.0043

Original Bulletin: 
   https://www-01.ibm.com/support/docview.wss?uid=swg21992517

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Multiple Security Vulnerabilities exist in IBM Cognos 
Express.

Document information

More support for: Cognos Express

Software version: 10.1, 10.2.1, 10.2.2

Operating system(s): Windows

Reference #: 1992517

Modified date: 25 October 2016

Security Bulletin

Summary

There are multiple vulnerabilities in IBM SDK, Java Technology Edition 
Quarterly CPU - Oct 2015 - Includes Oracle Oct 2015 CPU + CVE-2015-5006; IBM 
SDK, Java Technology Edition Quarterly CPU - Jan 2016 - Includes Oracle Jan 
2016 CPU + 3 IBM CVEs; IBM SDK, Java Technology Edition Quarterly CPU - Apr 
2016 - Includes Oracle Apr 2016 CPU + 3 IBM CVEs and OpenSSL vulnerabilities.

Vulnerability Details

CVEID: CVE-2015-1794

DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by an error
when a client receives a ServerKeyExchange for an anonymous DH ciphersuite 
with the value of p set to 0. An attacker could exploit this vulnerability to
trigger a segfault and cause a denial of service.

CVSS Base Score: 3.7

CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/108539 for the current 
score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2015-3193

DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive 
information, caused by an error in the x86_64 Montgomery squaring procedure. 
An attacker with online access to an unpatched system could exploit this 
vulnerability to obtain private key information.

CVSS Base Score: 5.3

CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/108502 for the current 
score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2015-3194

DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by a NULL 
pointer dereference when verifying certificates via a malformed routine. An 
attacker could exploit this vulnerability using signature verification 
routines with an absent PSS parameter to cause any certificate verification 
operation to crash.

CVSS Base Score: 5.3

CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/108503 for the current 
score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2015-3195

DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive 
information, caused by a memory leak in a malformed X509_ATTRIBUTE structure.
An attacker could exploit this vulnerability to obtain CMS data and other 
sensitive information.

CVSS Base Score: 5.3

CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/108504 for the current 
score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2015-3196

DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by a race 
condition when PSK identity hints are received by a multi-threaded client and
the SSL_CTX structure is updated with the incorrect value. An attacker could 
exploit this vulnerability to possibly corrupt memory and cause a denial of 
service.

CVSS Base Score: 3.7

CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/108505 for the current 
score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2015-3197

DESCRIPTION: OpenSSL could allow a remote attacker to conduct 
man-in-the-middle attacks, caused by an error related to the negotiation of 
disabled SSLv2 ciphers by malicious SSL/TLS clients. An attacker could exploit
this vulnerability to conduct man-in-the-middle attacks.

CVSS Base Score: 5.4

CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/110235 for the current 
score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N)

CVEID: CVE-2015-4803

DESCRIPTION: An unspecified vulnerability in Oracle Java SE and JRockit 
related to the JAXP component could allow a remote attacker to cause a denial
of service.

CVSS Base Score: 5

CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/107358 for the current 
score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVEID: CVE-2015-4893

DESCRIPTION: An unspecified vulnerability in Oracle Java SE and JRockit 
related to the JAXP component could allow a remote attacker to cause a denial
of service.

CVSS Base Score: 5

CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/107359 for the current 
score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVEID: CVE-2015-4911

DESCRIPTION: An unspecified vulnerability in Oracle Java SE and JRockit 
related to the JAXP component could allow a remote attacker to cause a denial
of service.

CVSS Base Score: 5

CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/107360 for the current 
score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVEID: CVE-2015-5006

DESCRIPTION: IBM Java Security Components could allow an attacker with 
physical access to the system to obtain sensitive information from the 
Kerberos Credential Cache.

CVSS Base Score: 4.6

CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/106309 for the current 
score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID: CVE-2016-0466

DESCRIPTION: An unspecified vulnerability in Oracle Java SE Java SE Embedded 
and Jrockit related to the JAXP component could allow a remote attacker to 
cause a denial of service resulting in a partial availability impact using 
unknown attack vectors.

CVSS Base Score: 5

CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/109948 for the current 
score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVEID: CVE-2016-0448

DESCRIPTION: An unspecified vulnerability in Oracle Java SE and Java SE 
Embedded related to the JMX component could allow a remote attacker to obtain
sensitive information resulting in a partial confidentiality impact using 
unknown attack vectors.

CVSS Base Score: 4

CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/109949 for the current 
score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N)

CVEID: CVE-2016-0702

DESCRIPTION: OpenSSL could allow a local attacker to obtain sensitive 
information, caused by a side-channel attack against a system based on the 
Intel Sandy-Bridge microarchitecture. An attacker could exploit this 
vulnerability to recover RSA keys.

CVSS Base Score: 2.9

CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/111144 for the current 
score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2016-0705

DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by a 
double-free error when parsing DSA private keys. An attacker could exploit 
this vulnerability to corrupt memory and cause a denial of service.

CVSS Base Score: 3.7

CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/111140 for the current 
score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2016-0799

DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive 
information, caused by a memory error in the BIO_*printf() functions. An 
attacker could exploit this vulnerability using specially crafted data to 
trigger an out-of-bounds read.

CVSS Base Score: 3.7

CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/111143 for the current 
score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2016-2107

DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive 
information, caused by an error when the connection uses an AES CBC cipher and
the server support AES-NI. A remote user with the ability to conduct a 
man-in-the-middle attack could exploit this vulnerability via the POODLE 
(Padding Oracle On Downgraded Legacy Encryption) attack to decrypt traffic.

CVSS Base Score: 4.3

CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/112854 for the current 
score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)

CVEID: CVE-2016-2176

DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive 
information, By sending an overly long ASN.1 string to the X509_NAME_oneline()
function, an attacker could exploit this vulnerability to return arbitrary 
stack data in the buffer.

CVSS Base Score: 5.3

CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/112858 for the current 
score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2016-2842

DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by the 
failure to verify that a certain memory allocation succeeds by the doapr_outch
function. A remote attacker could exploit this vulnerability using a specially
crafted string to cause an out-of-bounds write or consume an overly large 
amount of resources.

CVSS Base Score: 7.5

CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/111304 for the current 
score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2016-3427

DESCRIPTION: An unspecified vulnerability in Oracle Java, SE Java SE Embedded
and JRockit related to the JMX component has complete confidentiality impact,
complete integrity impact, and complete availability impact.

CVSS Base Score: 10

CVSS Temporal Score: See 
https://exchange.xforce.ibmcloud.com/vulnerabilities/112459 for the current 
score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Affected Products and Versions

IBM Cognos Express 10.1.x

IBM Cognos Express 10.2.1

IBM Cognos Express 10.2.2

Remediation/Fixes

IBM Cogonos Express 10.2.1

The recommended solution is to apply the fix for versions listed as soon as 
practical.

IBM Cogonos Express 10.2.1 FP4 IF 1

IBM Cognos Express 10.2.2

IBM Cognos TM1 and IBM Cognos Business Intelligence are shipped as components
of IBM Cognos Express. Information about a security vulnerability affecting 
IBM Cognos TM1 and IBM Cognos Business Intelligence has been published in 
their respective Security Bulletins.

Security Bulletin: IBM Cognos TM1 is affected by multiple vulnerabilities

Security Bulletin: IBM Cognos Business Intelligence Sever 2016Q2 Security 
Updater : IBM Cognos Business Intelligence Server is affected by multiple 
vulnerabilities

IBM Cognos Express 10.1.x

IBM Cognos Express 10.1.x customers should upgrade to a more current version 
and apply the corresponding update. Please contact Customer Support with any 
questions.

https://www-947.ibm.com/support/entry/myportal/product/cognos/cognos_express?productContext=-15869866

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support 
alerts like this.

References

Complete CVSS v2 Guide

On-line Calculator v2

Complete CVSS v3 Guide

On-line Calculator v3

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the 
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the 
Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Ug6w
-----END PGP SIGNATURE-----