-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.2021
Security Bulletin: Multiple vulnerabilities may affect IBM(R) SDK Java(TM)
Technology Edition Version 6, 7, 8 and IBM(R) Runtime Environment Java(TM)
Version 6, 7, 8 in IBM FileNet Content Manager, and IBM Content Foundation
                              14 August 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM FileNet Content Manager
                   IBM Content Search Services
Publisher:         IBM
Operating System:  AIX
                   Linux variants
                   Solaris
                   Windows
Impact/Access:     Denial of Service -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-9843 CVE-2016-9842 CVE-2016-9841
                   CVE-2016-9840  

Reference:         ESB-2017.2020
                   ESB-2017.1974
                   ESB-2017.0805
                   ESB-2017.0492

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=swg22003154

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Multiple vulnerabilities may affect IBM(R) SDK Java(TM)
Technology Edition Version 6, 7, 8 and IBM(R) Runtime Environment Java(TM)
Version 6, 7, 8 in IBM FileNet Content Manager, and IBM Content Foundation

Document information

More support for: FileNet Content Manager
Content Search Services

Software version: 5.2.1

Operating system(s): AIX, Linux, Solaris, Windows

Reference #: 2003154

Modified date: 11 August 2017

Security Bulletin

Summary

Security Bulletin: Multiple vulnerabilities may affect IBM(R) SDK Java(TM)
Technology Edition Version 6, 7, 8 and IBM(R) Runtime Environment Java(TM)
Version 6, 7, 8 in IBM FileNet Content Manager, and IBM Content Foundation.
Java SE issues disclosed in the Oracle April 2017 Critical Patch Update.
Vulnerability Details

Advisory CVEs:
CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843


This bulletin covers all applicable Java SE CVEs published by Oracle as
part of their April 2017 Critical Patch Update. For more information please
refer to Oracle's April 2017 CPU Advisory and the X-Force database entries
referenced below.


CVEID: CVE-2016-9840
DESCRIPTION: zlib is vulnerable to a denial of service, caused by an
out-of-bounds pointer arithmetic in inftrees.c. By persuading a victim to
open a specially crafted document, a remote attacker could exploit this
vulnerability to cause a denial of service.
CVSS Base Score: 3.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/120508 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)

CVEID: CVE-2016-9841
DESCRIPTION: zlib is vulnerable to a denial of service, caused by an
out-of-bounds pointer arithmetic in inftrees.c. By persuading a victim to
open a specially crafted document, a remote attacker could exploit this
vulnerability to cause a denial of service.
CVSS Base Score: 3.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/120509 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)

CVEID: CVE-2016-9842
DESCRIPTION: zlib is vulnerable to a denial of service, caused by an
undefined left shift of negative number. By persuading a victim to
open a specially crafted document, a remote attacker could exploit this
vulnerability to cause a denial of service.
CVSS Base Score: 3.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/120510 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)

CVEID: CVE-2016-9843
DESCRIPTION: zlib is vulnerable to a denial of service, caused by a
big-endian out-of-bounds pointer. By persuading a victim to open a specially
crafted document, a remote attacker could exploit this vulnerability to
cause a denial of service.
CVSS Base Score: 3.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/120511 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)

Affected Products and Versions

FileNet Content Manager 5.0.0, 5.2.1

Remediation/Fixes

To address this vulnerability install one of the fixes listed below to
upgrade the IBM Java JRE.

The fixes supply the proper Java JRE for the various release levels of
the affected products. Depending upon the product and release level,
these fixes will upgrade the Java JRE (April 2017) to one of the following:

    IBM JRE, Java Technology Edition, Version 6 Service Refresh 16 Fix
    Pack 45
    IBM JRE, Java Technology Edition, Version 7 Service Refresh 10 Fix
    Pack 15
    IBM JRE, Java Technology Edition, Version 8 Service Refresh 4 Fix Pack 5

Product				VRMF		APAR		Remediation/First Fix
FileNet Content Manager		5.0.0		PJ44768		5.0.0.10-P8PE-FP010 - 8/11/2017
				5.2.1				5.2.1.7-P8CSS-FP007 - 6/26/2017


In the above table, the APAR links will provide more information about
the fix.

Workarounds and Mitigations

None

Important note

IBM strongly suggests that all System z customers be subscribed to the
System z Security Portal to receive the latest critical System z security
and integrity service. If you are not subscribed, see the instructions
on the System z Security web site. Security and integrity APARs and
associated fixes will be posted to this portal. IBM suggests reviewing
the CVSS scores and applying all security or integrity fixes as soon as
possible to minimize any potential risk.

References

Complete CVSS v3 Guide
On-line Calculator v3

Related information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
Oracle April 2017 Java SE Critical Patch Update Advisory
IBM SDK, Java Technology Edition Security Vulnerabilities

Change History

26 June, 2017: Initial release
11 August 2017: 5.0.0.10-P8PE-FP010 release

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.
Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ZJnD
-----END PGP SIGNATURE-----