-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.1252
    Security Bulletin: A security vulnerability has been identified in
    WebSphere Application Server that ships with Rational Asset Manager
               (CVE-2017-1151, CVE-2017-1137, CVE-2017-1194)
                                17 May 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM WebSphere Application Server
Publisher:         IBM
Operating System:  AIX
Impact/Access:     Access Privileged Data     -- Remote/Unauthenticated      
                   Increased Privileges       -- Existing Account            
                   Cross-site Request Forgery -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-1194 CVE-2017-1151 CVE-2017-1137

Reference:         ESB-2017.1207
                   ESB-2017.1194
                   ESB-2017.1183
                   ESB-2017.1155

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=swg22003258

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: A security vulnerability has been identified in WebSphere
Application Server that ships with Rational Asset Manager (CVE-2017-1151,
CVE-2017-1137, CVE-2017-1194)

Security Bulletin

Document information

More support for:

Rational Asset Manager

General Information

Software version:

7.5, 7.5.1, 7.5.2, 7.5.3

Operating system(s):

AIX

Reference #:

2003258

Modified date:

16 May 2017

Summary

WebSphere Application Server is shipped as a component of Rational Asset
Manager. Information about security vulnerability affecting the WebSphere
Application Server is published in this security bulletin.

Vulnerability Details

You must refer to the following security bulletins for vulnerability details
and information about fixes:

Security Bulletin: Information Disclosure in IBM WebSphere Application Server
(CVE-2017-1151)

Security Bulletin: Potential security vulnerability in WebSphere Application
Server Administrative Console (CVE-2017-1137)

Security Bulletin: Cross-site request forgery in WebSphere Application Server
(CVE-2017-1194)

Affected Products and Versions

IBM Rational Asset Manager 7.5, 7.5.1, 7.5.2, and 7.5.3.

Remediation/Fixes

You must refer to the appropriate security bulletin for fix pack releases or
an iFix listed in the following table and apply it.

RAM		Embedded WAS?		WAS 7.0					WAS 8.0					WAS 8.5
7.5		Yes			See the 		 		N/A					N/A
					Security Bulletin - CVE-2017-1194 
					for fix.
7.5.1					as above				See the					N/A
										Security Bulletin - CVE-2017-1151, 
										Security Bulletin CVE-2017-1137
										and
										Security Bulletin - CVE-2017-1194
										for fix.

7.5.2		No			N/A					as above				See the
															Security Bulletin - CVE-2017-1151,
															Security Bulletin CVE-2017-1137
															and
															Security Bulletin - CVE-2017-1194
															for fix.

7.5.3		as above		as above				as above				as above


Workarounds and Mitigations

None.

References

Complete CVSS v2 Guide

On-line Calculator v2

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

Acknowledgement

None

Change History

* 16 May 2017: Original copy published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=pueo
-----END PGP SIGNATURE-----