Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.1886 security vulnerability has been identified in OpenSSL, which is shipped with IBM Tivoli Network Manager IP Edition (CVE-2019-1559) 27 May 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Tivoli Network Manager IP Edition Publisher: IBM Operating System: AIX Linux variants Solaris Windows z/OS Impact/Access: Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-1559 Reference: ASB-2019.0147 ASB-2019.0128 ASB-2019.0120 ASB-2019.0088 Original Bulletin: http://www.ibm.com/support/docview.wss?uid=ibm10883428 - --------------------------BEGIN INCLUDED TEXT-------------------- security vulnerability has been identified in OpenSSL, which is shipped with IBM Tivoli Network Manager IP Edition (CVE-2019-1559) Product: Tivoli Network Manager IP Edition Software version: 3.9 Operating system(s): AIX, Linux, Solaris, Windows, z/OS Reference #: 0883428 Security Bulletin Summary OpenSSL is shipped with IBM Tivoli Network Manager IP Edition version 3.9. Information about a security vulnerability affecting Open SSL has been published here. Vulnerability Details CVE-ID: C VE-2019-1559 Description: OpenSSL could allow a remote attacker to obtain sensitive information, caused by the failure to immediately close the TCP connection after the hosts encounter a zero-length record with valid padding. An attacker could exploit this vulnerability using a 0-byte record padding-oracle attack to decrypt traffic. CVSS Base Score: 5.8 CVSS Temporal Score: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 157514 for more information CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N) Affected Products and Versions IBM Tivoli Network Manager IP Edition v3.9 Fix Pack 4 & Fix Pack 5. Remediation/Fixes +-------------------+--------------------+--------------------------------------------------------------+ |IBM Tivoli Network |APAR IJ15786 |Please call IBM service and reference APAR IJ15786 , to obtain| |Manager IP Edition | |a fix. | |3.9 FP4 and FP5 | | | +-------------------+--------------------+--------------------------------------------------------------+ Workarounds and Mitigations Only customers on ITNM v3.9 FP4 or FP5 who have Java SSL Collectors enabled may be affected. These collectors are not enabled by default. Change History 9 May 2019 - Initial version published. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXOtf0maOgq3Tt24GAQhf3Q/8DMf2LjcwWxU4a/4XIVx0m6RyLecGmCNm qMH6EOei40PuVv3C76rsvE78uNQHkouARgjF22ADtMu1GwjHFE03B5X3W8yR4+hi T00g3YcFR6SQlr258LO8hI7MmBdyJnIecTCehn4tzmEPDzL41jpQTENJd8nFJnL/ vbZVR/llGwWCv//PQ/w2J37hEDwjQhiN9BFVpZuYGxXjBXbckGNUVjkYHoZtgysK qDm18oTto8CRV0xeE8PC6ir5o+WXYxQt1cTvjHDU58BY1aZQd2BU8dhAZJHLNtf0 6fXYV3E2RHmMZyxTZzHS31rbCLR4GGVJspYnBNcS5BJP5hPJT6lOqj17MsouJJ6E SOh2Bs597gBv0us5x45ZvhPnDn7pb23uOu6TZAVXERLppZPvJ1KOPx83TVtC0D82 4BctpeGD11eXIU6WNHwUx+JryLsnV0Lv32jPJ0qSbJsVuJ+o1Cm1uYThO7afiFyU gt7K6G7If7fcdnlzECQhceFbbFRsasNRTK0QrxTUeAZujbVjFkEtZd/ZHZPzrZwF IhLvMrlPV1G+dJRh8nUEjdDxYY56cMd3AZNw45ZgOTmZi2JH18TMPgGuv6KTa1OZ C6cURidPM+iwjHra+RBy0twU3xHzLJKr976Gzx4TRe61TL3lso8dcBTyAGX3uH2O jrjbmDbiC/8= =SS3U -----END PGP SIGNATURE-----