-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2018.2911.2
       Multiple vulnerabilities have been identified in IBM Netezza
                              Host Management
                             11 December 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Netezza Host Management
Publisher:         IBM
Operating System:  Network Appliance
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                   Increased Privileges            -- Existing Account            
                   Create Arbitrary Files          -- Remote with User Interaction
                   Denial of Service               -- Remote/Unauthenticated      
                   Access Confidential Data        -- Remote/Unauthenticated      
                   Unauthorised Access             -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-1000805 CVE-2018-1000156 CVE-2018-12539
                   CVE-2018-7750 CVE-2018-5740 CVE-2018-5146
                   CVE-2018-2973 CVE-2018-2952 CVE-2018-2940
                   CVE-2018-1656 CVE-2018-1517 CVE-2018-1050
                   CVE-2017-15804 CVE-2017-15670 CVE-2016-0705

Reference:         ASB-2018.0197
                   ASB-2018.0169
                   ASB-2018.0124
                   ASB-2018.0060
                   ESB-2016.0560
                   ESB-2016.0547
                   ESB-2016.0544
                   ESB-2016.0543.2

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=ibm10729465
   http://www.ibm.com/support/docview.wss?uid=ibm10729297
   http://www.ibm.com/support/docview.wss?uid=ibm10729637
   http://www.ibm.com/support/docview.wss?uid=ibm10729303
   http://www.ibm.com/support/docview.wss?uid=ibm10732846
   http://www.ibm.com/support/docview.wss?uid=ibm10787453

Comment: This bulletin contains six (6) IBM security advisories.

Revision History:  December  11 2018: Added #0787453
                   September 27 2018: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Open Source GNU glibc Vulnerabilities affect IBM Netezza
Host Management

Security Bulletin

Document information

More support for: PureData System for Analytics

Software version: All Versions

Operating system(s): Platform Independent

Reference #: 0729465

Modified date: 26 September 2018

Summary

Open Source GNU glibc is used by IBM Netezza Host Management. IBM Netezza Host
Management has addressed the applicable CVEs.

Vulnerability Details

CVEID: CVE-2017-15804
DESCRIPTION: GNU C Library (aka glibc or libc6) is vulnerable to a buffer
overflow, caused by improper bounds checking by glob function in glob.c. By
using a specially-crafted file, a local attacker could overflow a buffer.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
133996 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)

CVEID: CVE-2017-15670
DESCRIPTION: GNU C Library is vulnerable to a heap-based buffer overflow,
caused by improper bounds checking by the glob function in glob.c. By sending a
specially-crafted string, a remote attacker could overflow a buffer and execute
arbitrary code on the system.
CVSS Base Score: 7.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
133915 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

Affected Products and Versions

  o IBM Netezza Host Management  5.3.2-5.4.20

 

Remediation/Fixes

To resolve the reported CVEs for Red Hat Enterprise Linux (RHEL) on following
platforms :

PureData System for Analytics N3001
PureData System for Analytics N200x

Update to the following IBM Netezza Host Management release :

+----------------------------+------+-----------------------+
|          Product           | VRMF |Remediation / First Fix|
+----------------------------+------+-----------------------+
|IBM Netezza Host Management |5.4.21|Link to Fix Central    |
+----------------------------+------+-----------------------+


The Netezza Host Management software contains the latest RHEL updates for the
operating systems certified for use on IBM Netezza/PureData System for
Analytics appliances. IBM recommends upgrading to the latest Netezza Host
Management version to ensure that your hosts have the latest fixes, security
changes, and operating system updates. IBM Support can assist you with planning
for the Netezza Host Management and operating system upgrades to your
appliances.

For more details on IBM Netezza Host Management security patching:

  o Red Hat Enterprise Linux (RHEL) Security Patching for IBM PureData System
    for Analytics appliances



Change History

26 September 2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------------------------------------------------------------

Security Bulletin: Open Source Libvorbis, Patch and Python-paramiko
vulnerabilities affect IBM Netezza Host Management

Security Bulletin

Document information

More support for: PureData System for Analytics

Software version: All Versions

Operating system(s): Platform Independent

Reference #: 0729297

Modified date: 26 September 2018

Summary

Open Source Libvorbis Patch and Python-paramiko is used by IBM Netezza Host
Mangement. IBM Netezza Host Management has addressed the applicable CVEs.

Vulnerability Details

CVEID: CVE-2018-7750
DESCRIPTION: Paramiko could allow a remote attacker to bypass security
restrictions, caused by improper authentication in the transport.py in the SSH
server implementation. An attacker could exploit this vulnerability to bypass
the authentication process.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
140334 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVEID: CVE-2018-1000156
DESCRIPTION: GNU Patch could allow a remote attacker to execute arbitrary code
on the system, caused by an input validation error when processing patch files.
An attacker could exploit this vulnerability using a patch file processed via
the patch utility to execute arbitrary code on the system.
CVSS Base Score: 7.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
141283 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

CVEID: CVE-2018-5146
DESCRIPTION: libvorbis, as used in Mozilla Firefox, could allow a remote
attacker to execute arbitrary code on the system, caused by an out-of-bounds
memory write. By persuading a victim to open a specially-crafted media file, an
attacker could exploit this vulnerability to execute arbitrary code on the
system or cause the browser to crash.
CVSS Base Score: 8.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
140404 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
 
Affected Products and Versions

  o  IBM Netezza Host Management  5.4.5.0 - 5.4.20.0

Remediation/Fixes

To resolve the reported CVEs for Red Hat Enterprise Linux (RHEL) on following
platforms :

PureData System for Analytics N3001
PureData System for Analytics N200x

Update to the following IBM Netezza Host Management release :

+----------------------------+--------+-----------------------+
|          Product           |  VRMF  |Remediation / First Fix|
+----------------------------+--------+-----------------------+
|IBM Netezza Host Management |5.4.21.0|Link to Fix Central    |
+----------------------------+--------+-----------------------+


The Netezza Host Management software contains the latest RHEL updates for the
operating systems certified for use on IBM Netezza/PureData System for
Analytics appliances. IBM recommends upgrading to the latest Netezza Host
Management version to ensure that your hosts have the latest fixes, security
changes, and operating system updates. IBM Support can assist you with planning
for the Netezza Host Management and operating system upgrades to your
appliances.

For more details on IBM Netezza Host Management security patching:

  o Red Hat Enterprise Linux (RHEL) Security Patching for IBM PureData System
    for Analytics appliances



Change History

26 September 2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------------------------------------------------------------

Security Bulletin: Publicly disclosed vulnerability from BIND affect IBM
Netezza Host Management

Security Bulletin

Document information

More support for: PureData System for Analytics

Software version: All Versions

Operating system(s): Platform Independent

Reference #: 0729637

Modified date: 26 September 2018

Summary

Open Source Bind is used by IBM Netezza Host Management. IBM Netezza Host
Management has addressed the applicable CVE.

Vulnerability Details

CVEID: CVE-2018-5740
DESCRIPTION: ISC BIND is vulnerable to a denial of service, caused by a defect
in the deny-answer-aliases feature. By triggering this defect, a remote
attacker could exploit this vulnerability to cause an INSIST assertion failure
in name.c.
CVSS Base Score: 7.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
148131 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

  o IBM Netezza Host Management  5.3.8 - 5.4.20

 

Remediation/Fixes

To resolve the reported CVE for Red Hat Enterprise Linux (RHEL) on following
platforms :

PureData System for Analytics N3001
PureData System for Analytics N200x

Update to the following IBM Netezza Host Management release :

+----------------------------+------+-----------------------+
|          Product           | VRMF |Remediation / First Fix|
+----------------------------+------+-----------------------+
|IBM Netezza Host Management |5.4.21|Link to Fix Central    |
+----------------------------+------+-----------------------+


The Netezza Host Management software contains the latest RHEL updates for the
operating systems certified for use on IBM Netezza/PureData System for
Analytics appliances. IBM recommends upgrading to the latest Netezza Host
Management version to ensure that your hosts have the latest fixes, security
changes, and operating system updates. IBM Support can assist you with planning
for the Netezza Host Management and operating system upgrades to your
appliances.

For more details on IBM Netezza Host Management security patching:

  o Red Hat Enterprise Linux (RHEL) Security Patching for IBM PureData System
    for Analytics appliances


 



Change History

26 September 2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------------------------------------------------------------

Security Bulletin: Public disclosed vulnerability from Samba affect IBM Netezza
Host Management

Security Bulletin

Document information

More support for: PureData System for Analytics

Software version: All Versions

Operating system(s): Platform Independent

Reference #: 0729303

Modified date: 26 September 2018

Summary

Open Source Samba is used by IBM Netezza Host Management. IBM Netezza Host
Management has addressed the applicable CVE.

Vulnerability Details

CVEID: CVE-2018-1050
DESCRIPTION: Samba is vulnerable to a denial of service, caused by missing null
pointer checks on some of the input parameters. By sending specially RPC calls
to the 'spoolss' service, a remote attacker could exploit this vulnerability to
cause the print spooler service to crash.
CVSS Base Score: 7.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
140206 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

  o  IBM Netezza Host Management  5.4.5.0 - 5.4.20.0
 
Remediation/Fixes

To resolve the reported CVE for Red Hat Enterprise Linux (RHEL) on following
platforms :

PureData System for Analytics N3001
PureData System for Analytics N200x

Update to the following IBM Netezza Host Management release :

+----------------------------+--------+-----------------------+
|          Product           |  VRMF  |Remediation / First Fix|
+----------------------------+--------+-----------------------+
|IBM Netezza Host Management |5.4.21.0|Link to Fix Central    |
+----------------------------+--------+-----------------------+
     
The Netezza Host Management software contains the latest RHEL updates for the
operating systems certified for use on IBM Netezza/PureData System for
Analytics appliances. IBM recommends upgrading to the latest Netezza Host
Management version to ensure that your hosts have the latest fixes, security
changes, and operating system updates. IBM Support can assist you with planning
for the Netezza Host Management and operating system upgrades to your
appliances.

For more details on IBM Netezza Host Management security patching:

  o Red Hat Enterprise Linux (RHEL) Security Patching for IBM PureData System
    for Analytics appliances



Change History

26 September 2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------------------------------------------------------------

Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM
Platform Symphony and IBM Spectrum Symphony

Security Bulletin

Document information

More support for: IBM Spectrum Symphony

Software version: 7.1.1, 7.1.2, 7.2.0.2, 7.1 Fix Pack 1

Operating system(s): Linux

Reference #: 0732846

Modified date: 26 September 2018

Summary

There are multiple vulnerabilities in IBM(R) Runtime Environment Java(TM) Version 8
Service Refresh 5 Fix Pack 15 and earlier releases used by IBM Platform
Symphony and IBM Spectrum Symphony. IBM Platform Symphony and IBM Spectrum
Symphony have addressed the applicable CVEs.

Vulnerability Details

If you run your own Java code using the IBM Java Runtime delivered with this
product, you should evaluate your code to determine whether additional Java
vulnerabilities are applicable to your code. For a complete list of
vulnerabilities, refer to the "IBM Java SDK Security Bulletin", located in the
References section for more information.

CVEID:  CVE-2018-2973
DESCRIPTION:  An unspecified vulnerability related to the Java SE JSSE
component could allow an unauthenticated attacker to cause no confidentiality
impact, high integrity impact, and no availability impact.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
146835 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)

CVEID:  CVE-2018-2940
DESCRIPTION:  An unspecified vulnerability related to the Java SE Libraries
component could allow an unauthenticated attacker to obtain sensitive
information resulting in a low confidentiality impact using unknown attack
vectors.
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
146803 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)

CVEID:  CVE-2018-2952
DESCRIPTION:  An unspecified vulnerability related to the Java SE Concurrency
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base Score: 3.7
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
146815 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID:  CVE-2018-1656
DESCRIPTION:  The IBM Java Runtime Environment's Diagnostic Tooling Framework
for Java (DTFJ) does not protect against path traversal attacks when extracting
compressed dump files.
CVSS Base Score: 7.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
144882 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N)

CVEID: CVE-2018-12539
DESCRIPTION: Eclipse OpenJ9 could allow a local attacker to gain elevated
privileges on the system, caused by the failure to restrict the use of Java
Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and
use Attach API operations to only the process owner. An attacker could exploit
this vulnerability to execute untrusted native code and gain elevated
privileges on the system.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
148389 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID:  CVE-2018-1517
DESCRIPTION:  A flaw in the java.math component in IBM SDK, Java Technology
Edition may allow an attacker to inflict a denial-of-service attack with
specially crafted String data.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
141681 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2016-0705
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by a
double-free error when parsing DSA private keys.
An attacker could exploit this vulnerability to corrupt memory and cause a
denial of service.
CVSS Base Score: 3.7
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
111140 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

Affected Products and Versions

IBM Platform Symphony 7.1 Fix Pack 1
IBM Platform Symphony 7.1.1
IBM Spectrum Symphony 7.1.2
IBM Spectrum Symphony  7.2.0.2

Remediation/Fixes

Applicability

  o Operating systems: Linux x64

  o Cluster type: Single grid cluster

Prerequisite

To install or uninstall the .rpm packages for IBM Spectrum Symphony 7.1.2 and
7.2.0.2, you must have root permission and RPM version 4.2.1 or later must be
installed on the host.

Before installation

1. Log on to the master host as the cluster administrator.

2. Disable your applications, stop services, and shut down the cluster:

> source profile.platform

> soamcontrol app disable all

> egosh service stop all

> egosh ego shutdown all

3. Back up or uninstall the existing JRE on all management hosts:

For Platform Symphony 7.1 Fix Pack 1 and 7.1.1, back up the JRE folder (under 
$EGO_TOP/jre/<EGO_version>/linux-x86_64/). For example, in a Platform Symphony
7.1.1 cluster, back up the JRE folder at $EGO_TOP/jre/3.3/linux-x86_64/.

For IBM Spectrum Symphony 7.1.2 and 7.2.0.2, uninstall the existing JRE.

1. Query the existing JRE package and uninstall it from the dbpath location,
for example:

> rpm -qa --dbpath /tmp/rpm |grep egojre

egojre-1.8.0.3-408454.x86_64

> rpm -e egojre-1.8.0.3-408454.x86_64 --dbpath /tmp/rpm --nodeps

2. For IBM Spectrum Symphony 7.2.0.2, remove the leftover link under the jre
folder, for example:

> rm -rf $EGO_TOP/jre/8.0.5.0

Install this interim fix

1. Log on each management host as the cluster administrator and replace your
current JRE folder with the files in this interim fix.

For Platform Symphony 7.1 Fix Pack 1 and 7.1.1, remove the files in the
existing JRE folder and extract the interim package to the JRE folder on all
hosts.

For example, in a Platform Symphony 7.1.1 cluster, enter the following
commands:

> rm -rf $EGO_TOP/jre/3.3/linux-x86_64/*

> tar zxfo symSetup_jre8sr5fp21_linux-64_build502764.tar.gz -C $EGO_TOP/jre/3.3
/linux-x86_64

For IBM Spectrum Symphony 7.1.2 and 7.2.0.2, use the same dbpath and prefix as
the installation, for example:

> rpm -ivh --dbpath /tmp/rpm --prefix /opt/platform egojre-1.8.0.521.x86_64.rpm

2. Delete all subdirectories and files in the GUI work directory:

> rm -rf $EGO_TOP/gui/work/*

> rm -rf $EGO_TOP/gui/workarea/*

NOTE: If you configured the WLP_OUTPUT_DIR parameter and 
APPEND_HOSTNAME_TO_WLP_OUTPUT_DIR is set to true in the $EGO_CONFDIR/conf/
wlp.conf file, you must clean up the $WLP_OUTPUT_DIR/webgui_hostname/gui/
workarea/ directory.

3. Launch your browser and clear the browser cache.

4. Log on to the master host as the cluster administrator, start the cluster
and enable your applications:

> source profile.platform

> egosh ego start all

> soamcontrol app enable <appName>

Verify the installation

  o For Platform Symphony 7.1 Fix Pack 1, the following example shows output
    for the java -version command:

> $EGO_TOP/jre/3.1/linux-x86_64/bin/java -version

java version "1.8.0_181"

Java(TM) SE Runtime Environment (build 8.0.5.21 - pxa6480sr5fp21-20180830_01
(SR5 FP21))

IBM J9 VM (build 2.9, JRE 1.8.0 Linux amd64-64-Bit Compressed References
20180829_395745 (JIT enabled, AOT enabled)

OpenJ9   - e82188c

OMR      - eeaa30e

IBM      - 98805ca)

JCL - 20180821_01 based on Oracle jdk8u181-b12

  o For Platform Symphony 7.1.1, the following example shows output for the 
    java -version command:

> $EGO_TOP/jre/3.3/linux-x86_64/bin/java -version

java version "1.8.0_181"

Java(TM) SE Runtime Environment (build 8.0.5.21 - pxa6480sr5fp21-20180830_01
(SR5 FP21))

IBM J9 VM (build 2.9, JRE 1.8.0 Linux amd64-64-Bit Compressed References
20180829_395745 (JIT enabled, AOT enabled)

OpenJ9   - e82188c

OMR      - eeaa30e

IBM      - 98805ca)

JCL - 20180821_01 based on Oracle jdk8u181-b12

  o For IBM Spectrum Symphony 7.1.2, the following example shows output for the
    rpm -qa command:

> rpm -qa --dbpath /tmp/rpm |grep egojre

egojre-1.8.0.521-502764.x86_64

  o For IBM Spectrum Symphony 7.2.0.2, the following example shows output for
    the rpm -qa command:

> rpm -qa --dbpath /tmp/rpm |grep egojre

egojre-8.0.5.21-502764.x86_64

Uninstallation

If required, follow these instructions to uninstall this interim fix in your
cluster:

1. Log on to the master host as the cluster administrator.

2. Disable your applications, stop services, and shut down the cluster:

> source profile.platform

> soamcontrol app disable all

> egosh service stop all

> egosh ego shutdown all

3. Log on each management host as the cluster administrator and restore the JRE
folder from your backup.

For Platform Symphony 7.1 Fix Pack 1 and 7.1.1, restore your backup to the 
$EGO_TOP/jre/<EGO_version>/linux-x86_64/ folder. For example, in a Platform
Symphony 7.1.1 cluster, restore your backup to the $EGO_TOP/jre/3.3/
linux-x86_64/ folder.

For IBM Spectrum Symphony 7.1.2 and 7.2.0.2, uninstall the existing JRE, then
install the old one:

 1.  Uninstall the JRE fix, for example: > rpm -e egojre-1.8.0.521-502764.x86_64 --dbpath /tmp/rpm/ --nodeps

 2.  For IBM Spectrum Symphony 7.2.0.2, remove the leftover link under the jre folder, for example: > rm -rf $EGO_TOP/jre/8.0.5.21

 3.  Extract the egojre .rpm package from the .bin installation package, for example, for IBM Spectrum Symphony 7.1.2:
    > sym-7.1.2.0_x86_64.bin --extract /opt/extract

 4.  Reinstall the old JRE package. Use the same dbpath and prefix as the installation, for example: > rpm -ivh --dbpath /tmp/rpm --prefix /opt/platform /opt/extract/egojre-1.8.0.3.x86_64.rpm

4. Delete all subdirectories and files in the GUI work directory:

> rm -rf $EGO_TOP/gui/work/*

> rm -rf $EGO_TOP/gui/workarea/*

NOTE: If you configured the WLP_OUTPUT_DIR parameter and 
APPEND_HOSTNAME_TO_WLP_OUTPUT_DIR is set to true in the $EGO_CONFDIR/conf/
wlp.conf file, you must clean up the $WLP_OUTPUT_DIR/webgui_hostname/gui/
workarea/ directory.

5. Launch your browser and clear the browser cache.

6. Log on to the master host as the cluster administrator, start the cluster
and enable your applications:

> source profile.platform

> egosh ego start all

> soamcontrol app enable <appName>

Packages

+--------+-------+-------+----------------------------------------------------+
|Product |VRMF   |APAR   |Remediation/First Fix                               |
+--------+-------+-------+----------------------------------------------------+
|        |       |       |symSetup_jre8sr5fp21_linux-64_build502764.tar.gz    |
|IBM     |       |       |                                                    |
|Platform|7.1 Fix|P102730|http://www.ibm.com/support/fixcentral/swg/          |
|Symphony|Pack 1 |       |selectFixes?product=ibm/Other+software/             |
|        |       |       |Platform+Symphony&release=All&platform=All&function=|
|        |       |       |fixId&fixids=sym-7.1-build502764&includeSupersedes=0|
+--------+-------+-------+----------------------------------------------------+
|        |       |       |symSetup_jre8sr5fp21_linux-64_build502764.tar.gz    |
|        |       |       |                                                    |
|IBM     |       |       |http://www.ibm.com/support/fixcentral/swg/          |
|Platform|7.1.1  |P102730|selectFixes?product=ibm/Other+software/             |
|Symphony|       |       |Platform+Symphony&release=All&platform=All&function=|
|        |       |       |fixId&fixids=sym-7.1.1-build502764&includeSupersedes|
|        |       |       |=0                                                  |
+--------+-------+-------+----------------------------------------------------+
|        |       |       |egojre-1.8.0.521.x86_64.rpm                         |
|        |       |       |                                                    |
|IBM     |       |       |http://www.ibm.com/support/fixcentral/swg/          |
|Spectrum|7.1.2  |P102730|selectFixes?product=ibm/Other+software/             |
|Symphony|       |       |IBM+Spectrum+Symphony&release=All&platform=All&     |
|        |       |       |function=fixId&fixids=sym-7.1.2-build502764&        |
|        |       |       |includeSupersedes=0                                 |
+--------+-------+-------+----------------------------------------------------+
|        |       |       |egojre-8.0.5.21.x86_64.rpm                          |
|        |       |       |                                                    |
|IBM     |       |       |http://www.ibm.com/support/fixcentral/swg/          |
|Spectrum|7.2.0.2|P102730|selectFixes?product=ibm/Other+software/             |
|Symphony|       |       |IBM+Spectrum+Symphony&release=All&platform=All&     |
|        |       |       |function=fixId&fixids=sym-7.2.0.2-build502764&      |
|        |       |       |includeSupersedes=0                                 |
+--------+-------+-------+----------------------------------------------------+

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

Reference

Complete CVSS v3 Guide
On-line Calculator v3

IBM Java SDK Security Bulletin

Related Information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

25 September 2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.


                   Cross reference information
     Product      Component Platform        Version        Edition
Platform Symphony           Linux    7.1 Fix Pack 1, 7.1.1

- --------------------------------------------------------------------------------

Security Bulletin: Open Source Python-paramiko vulnerability affects IBM
Netezza Host Management.

Document information
Software version: All Versions
Operating system(s): Platform Independent
Reference #: 0787453
Modified date: 10 December 2018

Summary

Open Source Python-paramiko is used by IBM Netezza Host Management. IBM Netezza
Host Management has addressed the applicable CVE.

Vulnerability Details

CVEID: CVE-2018-1000805
DESCRIPTION: Paramiko could allow a remote attacker to execute arbitrary code
on the system, caused by an incorrect access control flaw in SSH server. An
attacker could exploit this vulnerability to execute arbitrary code on the
system.
CVSS Base Score: 9.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
151370 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

IBM Netezza Host Management  5.4.5.0 - 5.4.22.0

Remediation/Fixes

To resolve the reported CVEs for Red Hat Enterprise Linux (RHEL) on following
platforms :

PureData System for Analytics N3001
PureData System for Analytics N200x

Update to the following IBM Netezza Host Management release :

+-------------------------------------------------------------+
|          Product           |  VRMF  |Remediation / First Fix|
|----------------------------+--------+-----------------------|
|IBM Netezza Host Management |5.4.23.0|Link to Fix Central    |
+-------------------------------------------------------------+


The Netezza Host Management software contains the latest RHEL updates for the
operating systems certified for use on IBM Netezza/PureData System for
Analytics appliances. IBM recommends upgrading to the latest Netezza Host
Management version to ensure that your hosts have the latest fixes, security
changes, and operating system updates. IBM Support can assist you with planning
for the Netezza Host Management and operating system upgrades to your
appliances.

For more details on IBM Netezza Host Management security patching:

  * Red Hat Enterprise Linux (RHEL) Security Patching for IBM PureData System
    for Analytics appliances

Change History

10 December 2018: Original version published

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ePAS
-----END PGP SIGNATURE-----