-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.0836
 Security Bulletin: Security vulnerabilities have been identified in data
  server connection and product integration shipped with InfoSphere Optim
            Query Workload Tuner [for LUW, z/OS] (CVE-2016-5546
         CVE-2016-5548 CVE-2016-5549 CVE-2016-5547 CVE-2016-2183)
                               30 March 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM InfoSphere Optim Query Workload Tuner for DB2
Publisher:         IBM
Operating System:  z/OS
                   Linux variants
                   Windows
Impact/Access:     Access Privileged Data -- Remote/Unauthenticated
                   Denial of Service      -- Remote/Unauthenticated
                   Modify Arbitrary Files -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-5549 CVE-2016-5548 CVE-2016-5547
                   CVE-2016-5546 CVE-2016-2183 

Reference:         ASB-2017.0028
                   ASB-2017.0005
                   ASB-2017.0001
                   ESB-2016.2263
                   ESB-2016.2239.2
                   ESB-2016.2238

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=swg22000601

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Security vulnerabilities have been identified in
data server connection and product integration shipped with InfoSphere
Optim Query Workload Tuner [for LUW, z/OS] (CVE-2016-5546 CVE-2016-5548
CVE-2016-5549 CVE-2016-5547 CVE-2016-2183)

Document information

More support for: InfoSphere Optim Query Workload Tuner for DB2 for z/OS

Software version: 3.1, 3.1.1, 3.2, 4.1, 4.1.0.1, 4.1.1

Operating system(s): z/OS

Reference #: 2000601

Modified date: 28 March 2017

Security Bulletin

Summary

Data server connection and product integration are shipped as a component of
InfoSphere Optim Query Workload Tuner [for LUW, z/OS]. Information about
security vulnerabilities affecting data server connection and product
integration have been published in a security bulletin.

Vulnerability Details

CVEID: CVE-2016-5546
DESCRIPTION: An unspecified vulnerability related to the Libraries component
has no confidentiality impact, high integrity impact, and no availability
impact.
CVSS Base Score: 7.5
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/120869 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
CVEID: CVE-2016-5548
DESCRIPTION: An unspecified vulnerability related to the Libraries component
could allow a remote attacker to obtain sensitive information resulting
in a high confidentiality impact using unknown attack vectors.
CVSS Base Score: 6.5
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/120864 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)

CVEID: CVE-2016-5549
DESCRIPTION: An unspecified vulnerability related to the Libraries component
could allow a remote attacker to obtain sensitive information resulting
in a high confidentiality impact using unknown attack vectors.
CVSS Base Score: 6.5
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/120863 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)


CVEID: CVE-2016-5547
DESCRIPTION: An unspecified vulnerability related to the Libraries component
could allow a remote attacker to cause a denial of service resulting in
a low availability impact using unknown attack vectors.
CVSS Base Score: 5.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/120871 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2016-2183
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by an error in the DES/3DES cipher, used as a part of the
SSL/TLS protocol. By capturing large amounts of encrypted traffic between
the SSL/TLS server and the client, a remote attacker able to conduct a
man-in-the-middle attack could exploit this vulnerability to recover the
plaintext data and obtain sensitive information. This vulnerability is
known as the SWEET32 Birthday attack.
CVSS Base Score: 3.7
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/116337 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

IBM InfoSphere Optim Query Workload Tuner for DB2 for LUW 4.1.2 and earlier

IBM InfoSphere Optim Query Workload Tuner for DB2 for z/OS 4.1.2 and earlier

Remediation/Fixes

Each affected product and version requires the upgrade of the IBM SDK,
Java Technology Edition that is installed with the client. Install one of
the following IBM Java SDK versions:

    IBM SDK, Java Technology Edition, Version 8 Service Refresh 4 Fix Pack
    1 and subsequent releases
    IBM SDK, Java Technology Edition, Version 7R1 Service Refresh 4 Fix
    Pack 1 and subsequent releases
    IBM SDK, Java Technology Edition, Version 7 Service Refresh 10 Fix
    Pack 1 and subsequent releases
    IBM SDK, Java Technology Edition, Version 6R1 Service Refresh 8 Fix
    Pack 41 and subsequent releases
    IBM SDK, Java Technology Edition, Version 6 Service Refresh 16 Fix
    Pack 41 and subsequent releases
    Product 								Version 			IBM SDK
    IBM InfoSphere Optim Query Workload Tuner for DB2 for LUW    	3.1.0, 3.1.1 			Replace JRE (latest JRE V6)
    IBM InfoSphere Optim Query Workload Tuner for DB2 for z/OS

    IBM InfoSphere Optim Query Workload Tuner for DB2 for LUW    	3.2, 4.1.0, 4.1.0.1, 4.1.1 	Replace JRE (latest JRE V7)
    IBM InfoSphere Optim Query Workload Tuner for DB2 for z/OS

    IBM InfoSphere Optim Query Workload Tuner for DB2 for LUW	    	4.1.2			 	Replace JRE (latest JRE V8)
    IBM InfoSphere Optim Query Workload Tuner for DB2 for z/OS

Detailed instructions are provided in the tech-note " Updating the IBM
SDK, Java Technology Edition for InfoSphere Optim Query Workload Tuner
[for LUW, z/OS] Products"

References
Complete CVSS v2 Guide
On-line Calculator v2

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

17 March 2017: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Cross reference information


Segment 		Product 									Component 	Platform 	Version 	
Information Management 	InfoSphere Optim Query Workload Tuner for DB2 for Linux- UNIX and Windows 			Linux, Windows 	3.1, 3.1.1, 3.2, 4.1, 4.1.0.1, 4.1.1 	
Information Management 	InfoSphere Optim Query Workload Tuner for DB2 for z/OS 								3.1, 3.1.1, 3.2, 4.1, 4.1.0.1, 4.1.1

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=fw+F
-----END PGP SIGNATURE-----