-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.3196
   Security Bulletin:Eclipse OpenJ9 could allow a local attacker to gain
 elevated privileges on the system and The IBM Java Runtime Environment's
          Diagnostic Tooling Framework for Java does not protect
                 against CVE-2018-1656 and CVE-2018-12539
                              19 October 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Java Runtime Environment's Diagnostic Tooling Framework
Publisher:         IBM
Operating System:  AIX
                   Linux variants
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account            
                   Increased Privileges            -- Existing Account            
                   Modify Arbitrary Files          -- Remote with User Interaction
                   Access Confidential Data        -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-12539 CVE-2018-1656 

Reference:         ESB-2018.3161
                   ESB-2018.3160
                   ESB-2018.3074
                   ESB-2018.2977
                   ESB-2018.2873

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=ibm10735475

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin:Eclipse OpenJ9 could allow a local attacker to gain elevated
privileges on the system and The IBM Java Runtime Environment's Diagnostic
Tooling Framework for Java does not protect against CVE-2018-1656 and
CVE-2018-12539

Document information

More support for: InfoSphere Optim Performance Manager

Software version: 4.1, 4.1.0.1, 4.1.1, 5.1, 5.1.1, 5.1.1.1, 5.2, 5.3, 5.3.1

Operating system(s): AIX, Linux, Windows

Reference #: 0735475

Modified date: 18 October 2018

Summary

The IBM Java Runtime Environment's Diagnostic Tooling Framework for Java
(DTFJ) (IBM SDK, Java Technology Edition 6.0, 7.0, and 8.0) does not protect
against path traversal attacks when extracting compressed dump files. IBM
X-Force ID: 144882. And Eclipse OpenJ9 could allow a local attacker to gain
elevated privileges on the system, caused by the failure to restrict the use
of Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same
machine and use Attach API operations to only the process owner. An attacker
could exploit this vulnerability to execute untrusted native code and gain
elevated privileges on the system.

Vulnerability Details

CVEID: CVE-2018-1656
DESCRIPTION:  The IBM Java Runtime Environment's Diagnostic Tooling Framework
for Java (DTFJ) (IBM SDK, Java Technology Edition 6.0, 7.0, and 8.0) does not
protect against path traversal attacks when extracting compressed dump files.
IBM X-Force ID: 144882.
CVSS Base Score: 7.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
144882 for the current score
CVSS Environmental Score*: Undefined
CVSS Attack Vector: Local

CVEID: CVE-2018-12539
DESCRIPTION:  Eclipse OpenJ9 could allow a local attacker to gain elevated
privileges on the system, caused by the failure to restrict the use of Java
Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and
use Attach API operations to only the process owner. An attacker could exploit
this vulnerability to execute untrusted native code and gain elevated
privileges on the system.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
148389 for the current score
CVSS Environmental Score*: Undefined
CVSS Attack Vector: Local

Affected Products and Versions

IBM and Eclipse Foundation OpenJ9 0.8

IBM SDK, Java Technology Edition 6.0,7.0,8.0

Remediation/Fixes

You must replace the IBM(R) Runtime Environment, Java(TM) Technology Edition that
is installed with IBM InfoSphere Optim Performance Manager for DB2 on Linux,
UNIX, and Windows with the latest IBM(R) Runtime Environment, Java(TM) Technology
Edition. Detailed instructions are provided in the tech-note:  "Updating the
IBM Runtime Environment, Java(TM) Technology Edition for InfoSphere Optim
Performance Manager"

Workarounds and Mitigations

N/A

Change History

None

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBW8l3h2aOgq3Tt24GAQi+lA/+JLnBLLuNyb214i9og29SwhE0JkcjeFzv
Z986E2WtYcjLkh7hpFKNUdQ+Z3xjgbhpkWiHfS8mc+g/LdHVUfYLmtcYn0wknNE2
kqKNA57tdUFBK9ZtT93ZKLdJ7aXnHbecr6SoBTfTfFWUeNy8A8TlEbW9mZ2pDliZ
rC03OY/By56K6n/riEd3Gy5mXuzKpuT2KcDtiftQC1gG+QWSocYD8PciVLsju1gM
L71t15xik3hxmZGmqSDkhgC2QuRadpCL82CFdjTi7GbxZp6KF9IGhPeae/kuUqVC
U2ex+ISWYgV8f0QxpWSsjJ2WWOrNt8MT77uJtL4ODSpYXqn2v8L+XBJaQ5Ao8V6U
s86CR9Y+yeOdGBrqx60SKjFMkVO4oBlfgWg238mnId/P8TTo//8FY6JFL0DWU0IH
5bgYAZiM399J7fh2uus7qHGGKPhWB0X3jw+l5P01M6DpazJQdn6mEZ+mxt6sNEBq
54F/ylHjV/taDc57gVwQxQmt3CQFZcwXNfVH50rQwPB8/wkaW+uPeQ7ukuMvbXY/
3/uifuR4Bwyf2t/3M4YgwrwtDMDJ6XuQpFjzDuse3tHCzxLp+GLGcKcfOWsyOgXU
HZqL9xb8Ezx9F3BsKiA7JP7/B4a9eOwGPszPEservxnkxUiAnJPszqQIakJXjRXY
BODyj/xnkA8=
=29VE
-----END PGP SIGNATURE-----