-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.1727
        Security Bulletin: Multiple vulnerabilities in IBM Java SDK
                        affects WebSphere Cast Iron
                               12 July 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM WebSphere Cast Iron
Publisher:         IBM
Operating System:  Network Appliance
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Access Privileged Data          -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Provide Misleading Information  -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-3511 CVE-2017-3252 CVE-2016-5549
                   CVE-2016-5548 CVE-2016-5547 CVE-2016-5546
                   CVE-2016-2183  

Reference:         ESB-2017.1675

Original Bulletin: 
   https://www-01.ibm.com/support/docview.wss?uid=swg22005610
   https://www-01.ibm.com/support/docview.wss?uid=swg22005588

Comment: This bulletin contains two (2) IBM security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Multiple vulnerabilities in IBM Java SDK affects WebSphere
Cast Iron

Security Bulletin

Document information

More support for:

WebSphere Cast Iron Cloud integration

Software version:

7.5.0.0, 7.5.0.1, 7.5.1.0

Operating system(s):

Firmware

Software edition:

Physical, Virtual

Reference #:

2005610

Modified date:

11 July 2017

Summary

There are multiple vulnerabilities in IBM SDK Java Technology Edition,
Version 7 SR9 FP60 and Version 6 SR16 FP35 used by WebSphere Cast Iron. These
issues were disclosed as part of the IBM Java SDK updates in January 2017.

Vulnerability Details

CVEID:

CVE-2016-5546

DESCRIPTION:

An unspecified vulnerability in Oracle Java SE Java SE Embedded and Jrockit
related to the Libraries component has no confidentiality impact, high
integrity impact, and no availability impact.

CVSS Base Score: 7.5

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/120869

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)

CVEID:

CVE-2016-5548

DESCRIPTION:

An unspecified vulnerability in Oracle Java SE and Java SE Embedded related
to the Libraries component could allow a remote attacker to obtain sensitive
information resulting in a high confidentiality impact using unknown attack
vectors.

CVSS Base Score: 6.5

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/120864

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)

CVEID:

CVE-2016-5549

DESCRIPTION:

An unspecified vulnerability in Oracle Java SE and Java SE Embedded related
to the Libraries component could allow a remote attacker to obtain sensitive
information resulting in a high confidentiality impact using unknown attack
vectors.

CVSS Base Score: 6.5

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/120863

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)

CVEID:

CVE-2017-3252

DESCRIPTION:

An unspecified vulnerability in Oracle Java SE Java SE Embedded and Jrockit
related to the JAAS component has no confidentiality impact, high integrity
impact, and no availability impact.

CVSS Base Score: 5.8

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/120870

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N)

CVEID:

CVE-2016-5547

DESCRIPTION:

An unspecified vulnerability in Oracle Java SE Java SE Embedded and Jrockit
related to the Libraries component could allow a remote attacker to cause a
denial of service resulting in a low availability impact using unknown attack
vectors.

CVSS Base Score: 5.3

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/120871

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID:

CVE-2016-2183

DESCRIPTION:

OpenSSL could allow a remote attacker to obtain sensitive information, caused
by an error in the DES/3DES cipher, used as a part of the SSL/TLS protocol.
By capturing large amounts of encrypted traffic between the SSL/TLS server
and the client, a remote attacker able to conduct a man-in-the-middle attack
could exploit this vulnerability to recover the plaintext data and obtain
sensitive information. This vulnerability is known as the SWEET32 Birthday
attack.

CVSS Base Score: 3.7

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/116337

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

WebSphere Cast Iron v 7.5.1.0, 7.5.0.1, 7.5.0.0

Remediation/Fixes

Product              VRMF     APAR     Remediation/First Fix
Cast Iron Appliance  7.5.1.0  LI79634  iFix 7.5.1.0-CUMUIFIX-012
                     7.5.0.1
                     7.5.0.0

Workarounds and Mitigations

None.

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important 
product support alerts like this.

References

Complete CVSS v3 Guide

On-line Calculator v3

IBM Java SDK Security Bulletin


Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog


Acknowledgement

None.

Change History

11 July 2017: Original version published.

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- ---

Security Bulletin: A vulnerability in IBM Java SDK affects WebSphere Cast
Iron (CVE-2017-3511)

Security Bulletin

Document information

More support for:

WebSphere Cast Iron Cloud integration

Software version:

7.5.0.0, 7.5.0.1, 7.5.1.0

Operating system(s):

Firmware

Software edition:

Physical, Virtual

Reference #:

2005588

Modified date:

11 July 2017

Summary

There is a vulnerability in IBM SDK Java Technology Edition, Version 7 SR9
FP60 and Version 6 SR16 FP35 used by WebSphere Cast Iron. This issue was
disclosed as part of the IBM Java SDK updates in April 2017.

Vulnerability Details

CVEID:

CVE-2017-3511

DESCRIPTION:

An unspecified vulnerability in Oracle Java SE related to the Java SE, Java
SE Embedded, JRockit JCE component could allow an unauthenticated attacker to
take control of the system.

CVSS Base Score: 7.7

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/124890

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)

Affected Products and Versions

WebSphere Cast Iron v 7.5.1.0, 7.5.0.1, 7.5.0.0

Remediation/Fixes

Product              VRMF      APAR     Remediation/First Fix
Cast Iron Appliance  7.5.1.0,  LI79385  iFix 7.5.1.0-CUMUIFIX-012
                     7.5.0.1,
                     7.5.0.0

Workarounds and Mitigations

None.

Get Notified about Future Security Bulletins Subscribe to
My Notifications to be notified of important product support alerts 
like this.

References

Complete CVSS v3 Guide

On-line Calculator v3

IBM Java SDK Security Bulletin


Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog


Acknowledgement

None.

Change History

11 July 2017: Original version published.

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=xMWW
-----END PGP SIGNATURE-----