-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.2476
             Security Bulletin: Open Source Apache HTTP Server
       Vulnerabilities which is used by IBM PureApplication Systems
                              3 October 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM PureApplication Systems
Publisher:         IBM
Operating System:  AIX
                   Linux variants
                   Windows
Impact/Access:     Denial of Service              -- Remote/Unauthenticated      
                   Provide Misleading Information -- Remote/Unauthenticated      
                   Access Confidential Data       -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-7668 CVE-2016-8743 CVE-2016-2161
                   CVE-2016-0736  

Reference:         ASB-2017.0021
                   ASB-2017.0014
                   ESB-2017.2423
                   ESB-2017.2179
                   ESB-2017.2039

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=swg22008638
   http://www.ibm.com/support/docview.wss?uid=swg22009147

Comment: This bulletin contains two (2) IBM security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Open Source Apache HTTP Server Vulnerabilities which is
used by IBM PureApplication Systems (CVE-2017-7668)

Security Bulletin

Document information

More support for:
PureApplication System

Security

Software version:
2.1.0.0, 2.1.0.1, 2.1.0.2, 2.1.1.0, 2.1.2.0, 2.1.2.1, 2.1.2.2, 2.1.2.3,
2.1.2.4, 2.2.0.0, 2.2.1.0, 2.2.2.0, 2.2.2.1, 2.2.2.2, 2.2.3.0, 2.2.3.1,
2.2.3.2

Operating system(s):
AIX, Linux, Windows

Reference #:   2008638

Modified date: 02 October 2017

Summary

A vulnerability in Open Source Apache HTTP Server affects the PureSystems
Managers used by IBM PureApplication System.

Vulnerability Details

CVEID: CVE-2017-7668
DESCRIPTION:
Apache HTTPD is vulnerable to a denial of service, caused by a buffer
overread in the ap_find_token() function. By sending a specially crafted
sequence of request headers, a remote attacker could exploit this
vulnerability to cause a segmentation fault.
CVSS Base Score: 5.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/127419
for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

Affected Products and Versions

IBM PureApplication System V2.1.0.0
IBM PureApplication System V2.1.0.1
IBM PureApplication System V2.1.0.2
IBM PureApplication System V2.1.0.0
IBM PureApplication System V2.1.1.0
IBM PureApplication System V2.1.2.0
IBM PureApplication System V2.1.2.1
IBM PureApplication System V2.1.2.2
IBM PureApplication System V2.1.2.3
IBM PureApplication System V2.1.2.4
IBM PureApplication System V2.2.0.0
IBM PureApplication System V2.2.1.0
IBM PureApplication System V2.2.2.0
IBM PureApplication System V2.2.2.1
IBM PureApplication System V2.2.2.2
IBM PureApplication System V2.2.3.0
IBM PureApplication System V2.2.3.1
IBM PureApplication System V2.2.3.2

Remediation/Fixes

The PureSystems Managers. on IBM PureApplication System is affected. The 
solution is to upgrade the IBM PureApplication System to the following fix 
level:

IBM PureApplication System V2.2.0.0, V2.2.1.0, V2.2.2.0, V2.2.2.1, V2.2.2.2, 
V2.2.3.0, V2.2.3.1, V2.2.3.2
Upgrade to IBM PureApplication System V2.2.4.0. Contact IBM for assistance

IBM PureApplication System V2.1.0.0, V2.1.0.1, V2.1.0.2, V2.1.0.0, V2.1.1.0, 
V2.1.2.0, V2.1.2.1, V2.1.2.2, V2.1.2.3, V2.1.2.4:
IBM recommends upgrading to a fixed version of the product. Contact IBM 
for assistance

Information on upgrading can be found here: http://www-01.ibm.com/support/docview.wss?uid=swg27039159

Bluemix Local System is the evolution of the IBM PureApplication System Intel
based offerings.

Workarounds and Mitigations
None

References
Complete CVSS v3 Guide
On-line Calculator v3

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History
October 2, 2017: Original document published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer
According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

==============================================================================

Security Bulletin: Open Source Apache HTTP Server Vulnerabilities which is
used by IBM PureApplication Systems (CVE-2016-0736 CVE-2016-2161
CVE-2016-8743)

Security Bulletin

Document information

More support for:
PureApplication System

Security

Software version:
2.1.0.0, 2.1.0.1, 2.1.0.2, 2.1.1.0, 2.1.2.0, 2.1.2.1, 2.1.2.2, 2.1.2.3,
2.1.2.4, 2.2.0.0, 2.2.1.0, 2.2.2.0, 2.2.2.1, 2.2.2.2, 2.2.3.0, 2.2.3.1,
2.2.3.2

Operating system(s):
AIX, Linux, Windows

Reference #:   2009147

Modified date: 02 October 2017

Summary

A vulnerability in Open Source Apache HTTP Server affects the PureSystems
Managers used by IBM PureApplication System.

Vulnerability Details

CVEID: CVE-2016-0736
DESCRIPTION:
Apache HTTPD could allow a remote attacker to obtain sensitive information,
caused by an error in mod_session_crypto. By sending specially crafted data,
a remote attacker could exploit this vulnerability via the POODLE (Padding
Oracle On Downgraded Legacy Encryption) attack to gain access and modify
session data.
CVSS Base Score: 5.4
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/119918
for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N)

CVEID: CVE-2016-2161
DESCRIPTION:
Apache HTTPD is vulnerable to a denial of service, caused by an error in
mod_auth_digest. By sending specially crafted data, a remote attacker could
exploit this vulnerability to cause the server to crash.
CVSS Base Score: 5.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/119919
for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2016-8743
DESCRIPTION:
Apache HTTPD is vulnerable to HTTP response splitting attacks, caused by
improper validation of user-supplied input. A remote attacker could exploit
this vulnerability to inject arbitrary HTTP headers and cause the server to
return a split response, once the URL is clicked. This would allow the
attacker to perform further attacks, such as Web cache poisoning or cross-
site scripting, and possibly obtain sensitive information.
CVSS Base Score: 6.1
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/119917
for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

IBM PureApplication System V2.1.0.0
IBM PureApplication System V2.1.0.1
IBM PureApplication System V2.1.0.2
IBM PureApplication System V2.1.0.0
IBM PureApplication System V2.1.1.0
IBM PureApplication System V2.1.2.0
IBM PureApplication System V2.1.2.1
IBM PureApplication System V2.1.2.2
IBM PureApplication System V2.1.2.3
IBM PureApplication System V2.1.2.4
IBM PureApplication System V2.2.0.0
IBM PureApplication System V2.2.1.0
IBM PureApplication System V2.2.2.0
IBM PureApplication System V2.2.2.1
IBM PureApplication System V2.2.2.2
IBM PureApplication System V2.2.3.0
IBM PureApplication System V2.2.3.1
IBM PureApplication System V2.2.3.2

Remediation/Fixes

The PureSystems Managers. on IBM PureApplication System is affected. The 
solution is to upgrade the IBM PureApplication System to the following fix 
level:
IBM PureApplication System V2.2.0.0, V2.2.1.0, V2.2.2.0, V2.2.2.1, V2.2.2.2, 
V2.2.3.0, V2.2.3.1, V2.2.3.2
Upgrade to IBM PureApplication System V2.2.4.0. Contact IBM for assistance

IBM PureApplication System V2.1.0.0, V2.1.0.1, V2.1.0.2, V2.1.0.0, V2.1.1.0, 
V2.1.2.0, V2.1.2.1, V2.1.2.2, V2.1.2.3, V2.1.2.4:
IBM recommends upgrading to a fixed version of the product. Contact IBM for assistance

Information on upgrading can be found here: http://www-01.ibm.com/support/docview.wss?uid=swg27039159
Bluemix Local System is the evolution of the IBM PureApplication System Intel based offerings. 

Workarounds and Mitigations
None

References
Complete CVSS v3 Guide
On-line Calculator v3

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History
October 2, 2017: Original document published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Rikc
-----END PGP SIGNATURE-----