-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.2668
             IBM RackSwitch firmware products are affected by
                 vulnerability in OpenSSL (CVE-2018-0734)
                               18 July 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Other xSeries
Publisher:         IBM
Operating System:  Network Appliance
Impact/Access:     Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-0734  

Reference:         ASB-2019.0220
                   ASB-2019.0121
                   ASB-2019.0120
                   ASB-2019.0115

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=ibm10959339

- --------------------------BEGIN INCLUDED TEXT--------------------

IBM RackSwitch firmware products are affected by vulnerability in OpenSSL
(CVE-2018-0734)

Product:             Other xSeries
Operating system(s): Firmware
Reference #:         0959339

Security Bulletin

Summary

IBM RackSwitch firmware products listed below have addressed the following
vulnerability in OpenSSL.

Vulnerability Details

CVEID: CVE-2018-0734
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by a timing side channel attack in the DSA signature
algorithm. An attacker could exploit this vulnerability using variations in the
signing algorithm to recover the private key.
CVSS Base Score: 3.7
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
152085 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

Product                                  Affected Version

IBM RackSwitch G8000                     7.1

IBM RackSwitch G8052                     7.9

IBM RackSwitch G8052                     7.11

IBM RackSwitch G8124/G8124E              7.11

IBM RackSwitch G8264                     7.11

IBM RackSwitch G8264CS                   7.8

IBM RackSwitch G8264T                    7.9

IBM RackSwitch G8316                     7.9

IBM RackSwitch G8332                     7.7

G8264CS_SI_Fabric_Image                  7.8

Remediation/Fixes

Firmware fix versions are available on Fix Central: http://www.ibm.com/support/
fixcentral/

Product                                  Fix Version

IBM RackSwitch G8052                     7.11.15.0
(G8052_Image_7.11.15.0)

IBM RackSwitch G8124/G8124E              7.11.15.0
(G8124_G8124E_Image_7.11.15.0)

IBM RackSwitch G8264                     7.11.15.0
(G8264_Image_7.11.15.0)

IBM RackSwitch G8264CS                   7.8.22.0
(G8264CS_Image_7.8.22.0)

IBM RackSwitch G8264T                    7.9.25.0
(G8264T_Image_7.9.25.0)

IBM RackSwitch G8316                     7.9.25.0
(G8316_Image_7.9.25.0)

IBM RackSwitch G8332                     7.7.31.0
(G8332_Image_7.7.31.0)

G8264CS_SI_Fabric_Image - Bundle         7.8.23.0
(G8264CS_SI_Fabric_Image_7.8.23.0)

Workarounds and Mitigations

None

Change History

16 July 2019: Initial version published

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=CFVe
-----END PGP SIGNATURE-----