Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.1053 Multiple vulnerabilities have been identified in IBM WebSphere Commerce Enterprise 29 March 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM WebSphere Commerce Enterprise Publisher: IBM Operating System: AIX IBM i Linux variants Solaris Windows Impact/Access: Increased Privileges -- Existing Account Denial of Service -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2019-4094 CVE-2018-1977 CVE-2018-1897 Reference: ESB-2019.0806 ESB-2019.0592 ESB-2018.3874 ESB-2018.3695 Original Bulletin: https://www.ibm.com/support/docview.wss?uid=ibm10878394 https://www.ibm.com/support/docview.wss?uid=ibm10878398 https://www.ibm.com/support/docview.wss?uid=ibm10878402 Comment: This bulletin contains three (3) IBM security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- Security Bulletin: A Security Vulnerability has been Identified in IBM DB2 Shipped with IBM WebSphere Commerce (CVE-2018-1977) Security Bulletin Document information More support for: WebSphere Commerce Enterprise Component: Security Software version: WebSphere Commerce - Express, WebSphere Commerce Developer Enterprise, WebSphere Commerce Profession Operating system(s): AIX, IBM i, Linux, Solaris, Windows Reference #: 0878394 Modified date: 27 March 2019 Summary IBM DB2 is shipped as a component of IBM WebSphere Commerce. Information about a potential security vulnerability affecting the DB2 was published in a security bulletin. Vulnerability Details Consult the security bulletin IBM(R) DB2(R) contains a denial of service vulnerability in scalar functions (CVE-2018-1977) for vulnerability details and information about fixes. Affected Products and Versions WebSphere Commerce versions 7.0.0.0 or higher WebSphere Commerce versions 8.0.0.0 or higher Remediation/Fixes +---------------+-------------------+-----------------------------------------+ |Principal |Affected Supporting|Affected Supporting Product Security | |Product and |Product and Version|Bulletin | |Version(s) | | | +---------------+-------------------+-----------------------------------------+ |WebSphere | |IBM(R) DB2(R) contains a denial of service | |Commerce v7.0 |IBM DB2 11.1 |vulnerability in scalar functions | | | |(CVE-2018-1977) | +---------------+-------------------+-----------------------------------------+ |WebSphere | |IBM(R) DB2(R) contains a denial of service | |Commerce V8.0 |IBM DB2 11.1 |vulnerability in scalar functions | | | |(CVE-2018-1977) | +---------------+-------------------+-----------------------------------------+ Workarounds and Mitigations None. Change History 27 March 2019: Original Version Published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - -------------------------------------------------------------------------------- Security Bulletin: A Security Vulnerability has been Identified in IBM DB2 Shipped with IBM WebSphere Commerce (CVE-2018-1897) Security Bulletin Document information More support for: WebSphere Commerce Enterprise Component: Security Software version: WebSphere Commerce - Express, WebSphere Commerce Developer Enterprise, WebSphere Commerce Profession Operating system(s): AIX, IBM i, Linux, Solaris, Windows Reference #: 0878398 Modified date: 27 March 2019 Summary IBM DB2 is shipped as a component of IBM WebSphere Commerce. Information about a potential security vulnerability affecting the DB2 was published in a security bulletin. Vulnerability Details Consult the security bulletin IBM(R) DB2(R) is vulnerable to a buffer overflow leading to privilege escalation (CVE-2018-1897) for vulnerability details and information about fixes. Affected Products and Versions WebSphere Commerce versions 7.0.0.0 or higher WebSphere Commerce versions 8.0.0.0 or higher Remediation/Fixes +---------------+------------------+------------------------------------------+ |Principal |Affected |Affected Supporting Product Security | |Product and |Supporting Product|Bulletin | |Version(s) |and Version | | +---------------+------------------+------------------------------------------+ |WebSphere |IBM DB2 9.7, |IBM(R) DB2(R) is vulnerable to a buffer | |Commerce v7.0 |10.1,10.5 and 11.1|overflow leading to privilege escalation | | | |(CVE-2018-1897) | +---------------+------------------+------------------------------------------+ |WebSphere |IBM DB2 9.7, |IBM(R) DB2(R) is vulnerable to a buffer | |Commerce V8.0 |10.1,10.5 and 11.1|overflow leading to privilege escalation | | | |(CVE-2018-1897) | +---------------+------------------+------------------------------------------+ Workarounds and Mitigations None. Change History 27 March 2019: Original Version Published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - -------------------------------------------------------------------------------- Security Bulletin: A Security Vulnerability has been Identified in IBM DB2 Shipped with IBM WebSphere Commerce (CVE-2019-4094) Security Bulletin Document information More support for: WebSphere Commerce Enterprise Component: Security Software version: WebSphere Commerce - Express, WebSphere Commerce Developer Enterprise, WebSphere Commerce Profession Operating system(s): AIX, IBM i, Linux, Solaris, Windows Reference #: 0878402 Modified date: 27 March 2019 Summary IBM DB2 is shipped as a component of IBM WebSphere Commerce. Information about a potential security vulnerability affecting the DB2 was published in a security bulletin. Vulnerability Details Consult the security bulletin IBM(R) DB2(R) is vulnerable to privilege escalation via loading libraries from an untrusted path (CVE-2019-4094) for vulnerability details and information about fixes. Affected Products and Versions WebSphere Commerce versions 7.0.0.0 or higher WebSphere Commerce versions 8.0.0.0 or higher Remediation/Fixes +--------------+-----------------+--------------------------------------------+ |Principal |Affected | | |Product and |Supporting |Affected Supporting Product Security | |Version(s) |Product and |Bulletin | | |Version | | +--------------+-----------------+--------------------------------------------+ |WebSphere |IBM DB2 9.7, |IBM(R) DB2(R) is vulnerable to privilege | |Commerce v7.0 |10.1,10.5 and |escalation via loading libraries from an | | |11.1 |untrusted path (CVE-2019-4094) | +--------------+-----------------+--------------------------------------------+ |WebSphere |IBM DB2 9.7, |IBM(R) DB2(R) is vulnerable to privilege | |Commerce V8.0 |10.1,10.5 and |escalation via loading libraries from an | | |11.1 |untrusted path (CVE-2019-4094) | +--------------+-----------------+--------------------------------------------+ Workarounds and Mitigations None. Change History 27 March 2019: Original Version Published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXJ2LVWaOgq3Tt24GAQi8mg//ZYT994EDw/kwsZUrI8RyDFV7zXQXw+JR ilO85jx6oqdDddYyFnLIXRwCzCf3Rilsbajg5tq8DejYCZNsjKMjO25t6lp6k2AZ rdpqoZSzGOqUtM+U9bhZ6XvoPUugOsP4wZSyP0RMLwca2dqLldz9OpeSUSl4O2Sg MPzvA8+72yaqkBbEn2n8E14NHtWIJXtIP+hudDUV4iyJQR+GJtq6G6G2YMB9w71P Ts0uc+PF3moSqMcaHWZq64JIS5k4uiPNkYol82qATrd4Lu45Hc2jcCEKXFzKmu83 rVz7tZm9REcpdCBl0AuG0+IAIYTkFfhDulrGsQMtVX2JxXIgk9+dWwOzPzyZ+vmt zfFCpGEkJr4dUze/0GJst3o8AXfew4LR468C4d+/MvAFSGk3tt6TS6xRaKtro0kC rS8loTIP0Z8swyLEV4XXGCEeR2IeMG0h7EFJNxfm58cPVO9LbI952VdPje/fTSZm sM5iBDdwz3d0SP59SS2rfdzi53fdIc9FfzNCIDPak780Ra1xaQnmVIb16HWioP2X nNqrkJfyjZNyOF4iuvQCKAvY/Fff5z1MbC/JoYy7e3UbRxMm+3NTHWliaxLGGpq1 iPOOOpg1wOcObHLpgWH3zF8OedMeEmBMIXgzgu1o5tmTVSfh+9EHUk7bqCHD7gHX 47dv7iMPFfk= =x4j/ -----END PGP SIGNATURE-----