-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.0794
   Security Bulletin: Vulnerability in IBM Java SDK affects multiple IBM
              Rational products based on IBM Jazz technology
                               24 March 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Rational Collaborative Lifecycle Management
Publisher:         IBM
Operating System:  AIX
                   Linux variants
                   Solaris
                   Windows
                   iOS
Impact/Access:     Access Privileged Data   -- Remote/Unauthenticated      
                   Modify Arbitrary Files   -- Remote/Unauthenticated      
                   Denial of Service        -- Remote/Unauthenticated      
                   Access Confidential Data -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-3253 CVE-2016-5552 CVE-2016-5549
                   CVE-2016-5548 CVE-2016-5547 CVE-2016-5546
                   CVE-2016-2183  

Reference:         ASB-2017.0028
                   ASB-2017.0005
                   ASB-2017.0001
                   ESB-2016.2263
                   ESB-2016.2239.2
                   ESB-2016.2238

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=swg21999820

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Vulnerability in IBM Java SDK affects multiple IBM
Rational products based on IBM Jazz technology

Document information

More support for: Rational Collaborative Lifecycle Management
General Information

Software version: 4.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.0.6, 4.0.7,
5.0, 5.0.1, 5.0.2, 6.0, 6.0.1, 6.0.2, 6.0.3

Operating system(s): AIX, Linux, Solaris, Windows, iOS

Reference #: 1999820

Modified date: 22 March 2017

Security Bulletin

Summary

There are multiple vulnerabilities in IBM SDK Java Technology Edition,
Version 1.6 and 1.7 that are used by IBM Jazz Team Server affecting
the following IBM Jazz Team Server based Applications: Collaborative
Lifecycle Management (CLM), Rational DOORS Next Generation (RDNG),
Rational Engineering Lifecycle Manager (RELM), Rational Team Concert
(RTC), Rational Quality Manager (RQM), Rational Rhapsody Design Manager
(Rhapsody DM), and Rational Software Architect (RSA DM). These issues were
disclosed as part of the IBM Java SDK updates in January 2017.

Vulnerability Details

CVEID: CVE-2016-5546
DESCRIPTION: An unspecified vulnerability in Oracle Java SE Java SE Embedded
and Jrockit related to the Libraries component has no confidentiality
impact, high integrity impact, and no availability impact.
CVSS Base Score: 7.5
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/120869 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)

CVEID: CVE-2017-3253
DESCRIPTION: An unspecified vulnerability in Oracle Java SE Java SE Embedded
and Jrockit related to the 2D component could allow a remote attacker to
cause a denial of service resulting in a high availability impact using
unknown attack vectors.
CVSS Base Score: 7.5
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/120868 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2016-5548
DESCRIPTION: An unspecified vulnerability in Oracle Java SE and Java SE
Embedded related to the Libraries component could allow a remote attacker
to obtain sensitive information resulting in a high confidentiality impact
using unknown attack vectors.
CVSS Base Score: 6.5
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/120864 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)

CVEID: CVE-2016-5549
DESCRIPTION: An unspecified vulnerability in Oracle Java SE and Java SE
Embedded related to the Libraries component could allow a remote attacker
to obtain sensitive information resulting in a high confidentiality impact
using unknown attack vectors.
CVSS Base Score: 6.5
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/120863 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)

CVEID: CVE-2016-5547
DESCRIPTION: An unspecified vulnerability in Oracle Java SE Java SE Embedded
and Jrockit related to the Libraries component could allow a remote attacker
to cause a denial of service resulting in a low availability impact using
unknown attack vectors.
CVSS Base Score: 5.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/120871 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2016-5552
DESCRIPTION: An unspecified vulnerability in Oracle Java SE Java SE Embedded
and Jrockit related to the Networking component has no confidentiality
impact, low integrity impact, and no availability impact.
CVSS Base Score: 5.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/120872 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVEID: CVE-2016-2183
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by an error in the DES/3DES cipher, used as a part of the
SSL/TLS protocol. By capturing large amounts of encrypted traffic between
the SSL/TLS server and the client, a remote attacker able to conduct a
man-in-the-middle attack could exploit this vulnerability to recover the
plaintext data and obtain sensitive information. This vulnerability is
known as the SWEET32 Birthday attack.
CVSS Base Score: 3.7
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/116337 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
Affected Products and Versions

Rational Collaborative Lifecycle Management 4.0 - 6.0.3

Rational Quality Manager 4.0 - 4.0.7
Rational Quality Manager 5.0 - 5.0.2
Rational Quality Manager 6.0 - 6.0.3

Rational Team Concert 4.0 - 4.0.7
Rational Team Concert 5.0 - 5.0.2
Rational Team Concert 6.0 - 6.0.3

Rational DOORS Next Generation 4.0 - 4.0.7
Rational DOORS Next Generation 5.0 - 5.0.2
Rational DOORS Next Generation 6.0 - 6.0.3

Rational Engineering Lifecycle Manager 4.0.3 - 4.0.7
Rational Engineering Lifecycle Manager 5.0 - 5.0.2
Rational Engineering Lifecycle Manager 6.0 - 6.0.3

Rational Rhapsody Design Manager 4.0 - 4.0.7
Rational Rhapsody Design Manager 5.0 - 5.0.2
Rational Rhapsody Design Manager 6.0 - 6.0.3

Rational Software Architect Design Manager 4.0 - 4.0.7
Rational Software Architect Design Manager 5.0 - 5.0.2
Rational Software Architect Design Manager 6.0 - 6.0.3

Remediation/Fixes

IMPORTANT CONSIDERATIONS:

    If your product is deployed on WebSphere Application Server (WAS) and
    your deployment does not use an Eclipse based client nor the RM Browser
    plugin, then it is sufficient to continue using the existing version
    of your IBM Rational product, and only upgrade the JRE in the WAS server.
    For the below remediations, if you are a WAS deployment, then WAS
    must also be remediated, in addition to performing your product
    upgrades. Follow instructions at Security Bulletin: Multiple
    vulnerabilities in IBM Java SDK affects WebSphere Application Server
    January 2017 CPU to get the WAS remediation .
    If you are deploying the Rational products to a WAS Liberty or a Tomcat
    Server, you will need to follow the instructions below to upgrade the
    JRE, and then must also configure to complete the upgrade process:

            3.1. Stop the server: Navigate to the Server directory in
            your Ratonal product installation path and run this script:
            server.shutdown

            3.2. Navigate to the server directory in your Rational product
            installation path, open server.startup script using prefered
            text editor (e.g., Notepad for Windows or Vim Editor for Linux)
            and add one more option to the healthcenter parameter set:
                Search parameter
                -Dcom.ibm.java.diagnostics.healthcenter.agent in
                server.startup script to find the line containing the
                health center parameter.

                NOTE: For some Rational Collaborative Lifecycle Management
                versions, -Dcom.ibm.java.diagnostics.healthcenter.agent
                parameter may not be found in the server.startup, in this
                case the update is not needed and you can start using
                your server.

                Windows:
                Modify the line (where HEALTHCENTER_OPTS parameter located)
                by adding a new healthcenter option:
                -Dcom.ibm.java.diagnostics.healthcenter.agent.transport=jrmp

                Before modification:
                set HEALTHCENTER_OPTS=-agentlib:healthcenter
                -Dcom.ibm.java.diagnostics.healthcenter.agent.port=1972
                After modification:
                set HEALTHCENTER_OPTS=-agentlib:healthcenter
                -Dcom.ibm.java.diagnostics.healthcenter.agent.port=1972
                -Dcom.ibm.java.diagnostics.healthcenter.agent.transport=jrmp

                Linux:
                Modify the line (where HEALTHCENTER_OPTS parameter
                located) by adding a new healthcenter option:
                -Dcom.ibm.java.diagnostics.healthcenter.agent.transport=jrmp

                Before modification:
                export HEALTHCENTER_OPTS="-agentlib:healthcenter
                -Dcom.ibm.java.diagnostics.healthcenter.agent.port=1972"
                After modification:
                export HEALTHCENTER_OPTS="-agentlib:healthcenter
                -Dcom.ibm.java.diagnostics.healthcenter.agent.port=1972
                -Dcom.ibm.java.diagnostics.healthcenter.agent.transport=jrmp"
            3.3. Start the server. Navigate to the Server directory in
            your Rational product installation path and run this script:
            server.startup .


STEPS TO APPLY THE REMEDIATION:

1. Upgrade your products to a supported version: 4.0.7, 5.0.2, 6.0.2,
or 6.0.3
2. Apply the latest ifix for your installed version.
3. Obtain the January 2017 CPU update for the IBM  Java SDK.

        Based on version installed, obtain the latest ifixes (recommended),
        and the below indicated java from:
        For the 6.0.3 releases: JRE 7.1.4.1 (<product>-JavaSE-JRE-7.1SR4FP1)
            Rational Collaborative Lifecycle Management 6.0.3
            Rational Team Concert 6.0.3
            Rational Quality Manager 6.0.3
            Rational DOORS Next Generation 6.0.3
            Rational Software Architect Design Manager: Upgrade to version
            6.0.3 and install server and JRE from CLM 6.0.3
            Rational Rhapsody Design Manager: Upgrade to version 6.0.3
            and install server and JRE from CLM 6.0.3
            Rational Engineering Lifecycle Manager: Upgrade to version
            6.0.3 and install server and JRE from CLM 6.0.3

        For the 6.0.2 releases: JRE 7.1.4.1 (<product>-JavaSE-JRE-7.1SR4FP1)
            Rational Collaborative Lifecycle Management 6.0.2
            Rational Team Concert 6.0.2
            Rational Quality Manager 6.0.2
            Rational DOORS Next Generation 6.0.2
            Rational Software Architect Design Manager: Upgrade to version
            6.0.2 and install server and JRE from CLM 6.0.2
            Rational Rhapsody Design Manager: Upgrade to version 6.0.2
            and install server and JRE from CLM 6.0.2
            Rational Engineering Lifecycle Manager: Upgrade to version
            6.0.2 and install server and JRE from CLM 6.0.2
        For the 5.x releases: JRE 6.0.16.41
        (<product>-JavaSE-JRE-6.0SR16FP41)
            Rational Collaborative Lifecycle Management 5.0.2
            Rational Team Concert 5.0.2
            Rational Quality Manager 5.0.2
            Rational DOORS Next Generation 5.0.2
            Rational Software Architect Design Manager: Upgrade to version
            5.0.2 and install server and JRE from CLM 5.0.2
            Rational Rhapsody Design Manager: Upgrade to version 5.0.2
            and install server and JRE from CLM 5.0.2
            Rational Engineering Lifecycle Manager: Upgrade to version
            5.0.2 and install server and JRE from CLM 5.0.2

        For the 4.x releases: JRE 6.0.16.41
        (<product>-JavaSE-JRE-6.0SR16FP41)
            Rational Collaborative Lifecycle Management 4.0.7
            Rational Team Concert 4.0.7
            Rational Quality Manager 4.0.7
            Rational DOORS Next Generation/Requirements Composer 4.0.7
            Rational Software Architect Design Manager: Upgrade to version
            4.0.7 and install server and JRE from CLM 4.0.7
            Rational Rhapsody Design Manager: Upgrade to version 4.0.7
            and install server and JRE from CLM 4.0.7
            Rational Engineering Lifecycle Manager: Upgrade to version
            4.0.7 and install server and JRE from CLM 4.0.7

4. Upgrade your JRE following the instructions in the link below:
How to update the IBM SDK for Java of IBM Rational products based on
version 3.0.1.6 or later of IBM's Jazz technology

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

Important note

IBM strongly suggests that all System z customers be subscribed to the
System z Security Portal to receive the latest critical System z security
and integrity service. If you are not subscribed, see the instructions
on the System z Security web site. Security and integrity APARs and
associated fixes will be posted to this portal. IBM suggests reviewing
the CVSS scores and applying all security or integrity fixes as soon as
possible to minimize any potential risk.

References
Complete CVSS v3 Guide
On-line Calculator v3

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

22 March 2017: Initial Publication

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Cross reference information 

Segment	Product		Component					Platform		Version						Edition	
Software Development	Rational Quality Manager			General Information	AIX, Linux, Solaris, Windows			4.0, 4.0.0.1, 4.0.0.2, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.0.6, 4.0.7, 5.0, 5.0.1, 5.0.2, 6.0, 6.0.1, 6.0.2, 6.0.3
Software Development	Rational Team Concert				General Information	AIX,IBM i, Linux, Solaris, Windows, OS X	4.0, 4.0.0.1, 4.0.0.2, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.0.6, 4.0.7, 5.0, 5.0.1, 5.0.2, 6.0, 6.0.1, 6.0.2, 6.0.3
Software Development	Rational DOORS Next Generation			General information	IBM i, Linux, Windows				4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.0.6, 4.0.7, 5.0, 5.0.1, 5.0.2, 6.0, 6.0.1, 6.0.2, 6.0.3
Software Development	Rational Engineering Lifecycle Manager		General Information	Linux, Windows					4.0.3, 4.0.4, 4.0.5, 4.0.6, 4.0.7, 5.0, 5.0.1, 5.0.2, 6.0, 6.0.1, 6.0.2, 6.0.3
Software Development	Rational Rhapsody Design Manager		General Information	Linux, Windows					4.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.0.6, 4.0.7, 5.0, 5.0.1, 5.0.2, 6.0, 6.0.1, 6.0.2, 6.0.3
Software Development	Rational Software Architect Design Manager	General Information	AIX, Linux, Solaris, Windows			4.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.0.6, 4.0.7, 5.0, 5.0.1, 5.0.2, 6.0, 6.0.1

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=FSob
-----END PGP SIGNATURE-----