-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2019.1060.2
IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect
   Rational Directory Server (Tivoli) & Rational Directory Administrator
                               29 March 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Rational Directory Server
Publisher:         IBM
Operating System:  Linux variants
                   Windows
Impact/Access:     Modify Arbitrary Files   -- Remote/Unauthenticated
                   Denial of Service        -- Remote/Unauthenticated
                   Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-3180  

Reference:         ASB-2018.0290
                   ASB-2018.0256
                   ESB-2019.0960
                   ESB-2018.3260
                   ESB-2018.3258
                   ESB-2018.3164

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=ibm10875988

Revision History:  March 29 2019: Updated ESB number
                   March 29 2019: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

Multiple vulnerabilities in IBM Java Runtime affect Rational Directory Server
(Tivoli) & Rational Directory Administrator

Product:             Rational Directory Server

Component:           General Information

Software version:    5.2.1

Operating system(s): Linux, Windows

Reference #:         0875988

Security Bulletin

Summary

There are multiple vulnerabilities in IBM Runtime Environment Java Version 7
and Version 8 used by Rational Directory Server (Tivoli) and Rational Directory
Administrator. These issues were disclosed as part of the IBM Java SDK updates
in October 2018. Upgrade the JRE in order to resolve these issues.

Vulnerability Details

Rational Directory Server & Rational Directory Administrator are affected by
the following vulnerabilities:

CVEID: CVE-2018-3180
DESCRIPTION: An unspecified vulnerability related to the Java SE JSSE component
could allow an unauthenticated attacker to cause low confidentiality impact,
low integrity impact, and low availability impact.
CVSS Base Score: 5.6
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
151497 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)

If you run your own Java code using the IBM Java Runtime delivered with this
product, you should evaluate your code to determine whether additional Java
vulnerabilities are applicable to your code. For a complete list of
vulnerabilities, refer to the "IBM Java SDK Security Bulletin", located in the
References section for more information.

Affected Products and Versions

Rational Directory Server (Tivoli) v5.2.1 iFix 13 and earlier. 
Rational Directory Administrator v6.0.0.2 iFix 06 and earlier. 

Remediation/Fixes

1. Download one of the following IBM JRE versions that contain the fixes for
these vulnerabilities:

  o IBM Java Runtime Environment, Version 7 R1 Service Refresh 4 Fix Pack 35
  o IBM Java Runtime Environment, Version 8 Service Refresh 5 Fix Pack 25

2. After downloading a fixed IBM JRE version, refer the following technote for
JRE upgrade instructions:

  o JRE Upgrade Instructions for Rational Directory Server (Tivoli) 5.2.1
  o JRE Upgrade Instructions for Rational Directory Administrator 6.0.0.x

NOTE:

To improve the robustness of LDAPS (secure LDAP over TLS) connections, endpoint
identification algorithms have been enabled by default.
There may be situations where some applications that were previously able to
successfully connect to an LDAPS server may no longer be able to do so.
With this LDAP update, LDAP is asking JSSE to validate the LDAP server's
certificate to ensure it is compliant with hostname verification. With this
change, if the server's certificate is not compliant, then exception will be
thrown. In the past, LDAP did not request JSSE to perform hostname verification
and a non-compliant server certificate would not have had caused an issue.

In order to resolve the issue, Regenerate the RDS server certificate
(tdsserverkey.kdb) so that the certificate's subject name or certificate's
subject alternate name matches the RDS server hostname, by following
instructions from technote:

How can I generate my own 'tdsserverkey.kdb' keystore for TLSv12 communication
and use it in a IBM Rational Directory Server (Tivoli) deployment

After regenerating the RDS Server certificate matching with the RDS Server
Hostname, use FQDN's wherever applicable.
E.g. : RDA Login Screen, Creating RDS Partition and DOORS to RDS Connection.

For versions of Rational Directory Server that are earlier than version 5.2.1,
and Rational Directory Administrator versions earlier than 6.0.0.2, IBM
recommends upgrading to a fixed, supported version/release/platform of the
product.

Workarounds and Mitigations

None

Change History

26 March 2019: Initial Publication

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

                          Cross reference information
         Product             Component     Platform        Version      Edition
   Rational Directory     General         Linux,      6.0, 6.0.0.1,
      Administrator       Information     Windows     6.0.0.2

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=D9HV
-----END PGP SIGNATURE-----