-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.1431
   Multiple vulnerabilities in IBM Java SDK affect Rational Build Forge
 (CVE-2018-1890;CVE-2019-2426;CVE-2018-3139;CVE-2018-3180;CVE-2018-12547)
                               26 April 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Rational Build Forge
Publisher:         IBM
Operating System:  AIX
                   Linux variants
                   Solaris
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Increased Privileges            -- Existing Account      
                   Denial of Service               -- Remote/Unauthenticated
                   Access Confidential Data        -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-2426 CVE-2018-12547 CVE-2018-3180
                   CVE-2018-3139 CVE-2018-1890 

Reference:         ASB-2019.0018
                   ASB-2018.0290
                   ESB-2018.3260
                   ESB-2018.3258
                   ESB-2018.3164

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=ibm10743313

- --------------------------BEGIN INCLUDED TEXT--------------------

Multiple vulnerabilities in IBM Java SDK affect Rational Build Forge
(CVE-2018-1890;CVE-2019-2426;CVE-2018-3139;CVE-2018-3180;CVE-2018-12547)

Product:             Rational Build Forge
Component:           Web Console
Software version:    7.1.1.1, 7.1.1.2, 7.1.1.3, 7.1.1.4, 7.1.2, 7.1.2.1,
                     7.1.2.2, 7.1.2.3, 7.1.3, 7.1.3.1, 7.1.3.2, 7.1.3.3,
                     7.1.3.4, 7.1.3.5, 7.1.3.6, 8.0, 8.0.0.1, 8.0.0.2, 8.0.0.3,
                     8.0.0.4, 8.0.0.5, 8.0.0.6, 8.0.0.7, 8.0.0.8, 8.0.0.9,
                     8.0.0.10.
Operating system(s): AIX, Linux, Solaris, Windows
Software edition:    Enterprise, Enterprise Plus, Standard
Reference #:         0743313

Security Bulletin

Summary

There are multiple vulnerabilities in IBM SDK Java Technology Edition that is
used by IBM Rational Build Forge. IBM Rational Build Forge has addressed the
applicable CVEs.

Vulnerability Details

Rational Build Forge has addressed the following vulnerabilities:

If you run your own Java code using the IBM Java Runtime delivered with this
product, you should evaluate your code to determine whether additional Java
vulnerabilities are applicable to your code. For a complete list of
vulnerabilities, refer to the " IBM Java SDK Security Bulletin ", located in
the References section for more information.

CVEID: CVE-2019-2426
DESCRIPTION: An unspecified vulnerability related to the Java SE Networking
component could allow an unauthenticated attacker to obtain sensitive
information resulting in a low confidentiality impact using unknown attack
vectors.
CVSS Base Score: 3.7
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
155744 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2018-12547

DESCRIPTION: Eclipse OpenJ9 is vulnerable to a buffer overflow, caused by
improper bounds checking by the jio_snprintf()and jio_vsnprintf() functions. By
sending an overly long argument, a remote attacker could overflow a buffer and
execute arbitrary code on the system or cause the application to crash.
CVSS Base Score: 9.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
157512 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID: CVE-2018-1890
DESCRIPTION: IBM SDK, Java Technology Edition Version 8 on the AIX platform
uses absolute RPATHs which may facilitate code injection and privilege
elevation by local users.
CVSS Base Score: 5.6
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
152081 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L)

CVEID: CVE-2018-3180
DESCRIPTION: An unspecified vulnerability related to the Java SE JSSE component
could allow an unauthenticated attacker to cause low confidentiality impact,
low integrity impact, and low availability impact.
CVSS Base Score: 5.6
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
151497 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)

CVEID: CVE-2018-3139

DESCRIPTION: An unspecified vulnerability related to the Java SE Networking
component could allow an unauthenticated attacker to obtain sensitive
information resulting in a low confidentiality impact using unknown attack
vectors.
CVSS Base Score: 3.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
151455 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N)

Affected Products and Versions

IBM Rational Build Forge 8.0 to 8.0.0.10.

Remediation/Fixes

Apply the correct fix pack or iFix for your version of Build Forge:

+----------------------------+------------------------------------------------+
|Affected Version            |Fix                                             |
+----------------------------+------------------------------------------------+
|Build Forge 8.0 - 8.0.0.10  |Rational Build Forge 8.0.0.11 Download .        |
+----------------------------+------------------------------------------------+

Workarounds and Mitigations

None.

  o October 2018 release - IBM Java SDK Security Bulletin .
  o January 2019 release - IBM Java SDK Security Bulletin .

Acknowledgement

None

Change History

28 March 2019

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXMKf6WaOgq3Tt24GAQihYg//RYMNI5Fa7VLCzIfkGZpkwgHOpdpoVqyw
vhnKG/58EsLUWh1jugxbEyh0qXExQH6L8atb8t0FecKIZ8J+SEmLWWQFXObITNgZ
jKfD0ILFZiCW2vrNlp0pJwdEtU30rQ6PKUHhjD9J4G85HNmGJYBXZwImXxtycpkc
03XGzCec8jvEgnN53D329SNkCXEZlWLc+nSch+g4d2ypqpgOTlL3DQcpkHZhHN91
GcnfeF0fdcuy4231pPbPMEpYD3qn1QIL1HvC3fe5qrs+sx7o1yjBX1jdHShk+CDR
4dM4d8srGJoL7YAH2XtGkFsIrw0uYA/tA6hZB6kty9tRrHRWMvb8Aang38/EBrIm
+IsUB/yycrbqnjs2l5zSmn+OsRndcuQhniQZ3/sH/WR9JsoWCJBJlK/SD6axyu7V
L787KuqCBbYTiaSCKqKQvAI9m8i6m6BX7Dv+oW3cQiUJqnIKA/4u9sIQNo0ZNf96
70fObdCNiNfbrvpq/wGgHx6Pbc0ktnI8wRKKYzco+fROsVHhtd9UNVv/593TmUID
5xqSxcDGV/nBAiHYjWB+H/+RYOlxmNOvNRF/9rKDlWYejh7IDOpwAUJ7MQ4jVQ3l
u8hHJYguVoADEmS4noqjgoc2wZLMemM8goA/+orXwy5bmztpuHPw+tjp2+yZKRUn
bnYJ9ufbEj4=
=xmj+
-----END PGP SIGNATURE-----