Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.2846 Multiple vulnerabilities in IBM Java SDK affect IBM Tivoli Monitoring 31 July 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM Tivoli Monitoring V6 Publisher: IBM Operating System: AIX HP-UX Linux variants Solaris Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Modify Arbitrary Files -- Remote/Unauthenticated Increased Privileges -- Existing Account Denial of Service -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-10245 CVE-2019-2698 CVE-2019-2697 CVE-2019-2684 CVE-2019-2602 CVE-2019-2426 CVE-2019-2422 CVE-2018-11212 CVE-2018-1890 Reference: ASB-2019.0176 ASB-2019.0118 ESB-2019.2814 ESB-2019.2809 Original Bulletin: http://www.ibm.com/support/docview.wss?uid=ibm10959883 - --------------------------BEGIN INCLUDED TEXT-------------------- Multiple vulnerabilities in IBM Java SDK affect IBM Tivoli Monitoring Product: IBM Tivoli Monitoring V6 Software version: 6.3.0, 6.3.0.1, 6.3.0.2, 6.3.0.3, 6.3.0.4, 6.3.0.5, 6.3.0.6, 6.3.0.7 Operating system(s): AIX, HP-UX, Linux, Solaris, Windows Reference #: 0959883 Security Bulletin Summary There are several vulnerabilities in IBM SDK Java Technology Edition that is shipped as part of multiple IBM Tivoli Monitoring (ITM) components. Vulnerability Details CVEID: CVE-2019-10245 DESCRIPTION: Eclipse OpenJ9 is vulnerable to a denial of service, caused by the execution of a method past the end of bytecode array by the Java bytecode verifier. A remote attacker could exploit this vulnerability to cause the application to crash. CVSS Base Score: 7.5 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 160010 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVEID: CVE-2019-2684 DESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java SE, Java SE Embedded RMI component could allow an unauthenticated attacker to cause no confidentiality impact, high integrity impact, and no availability impact. CVSS Base Score: 5.9 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 159776 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N) CVEID: CVE-2019-2602 DESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java SE, Java SE Embedded Libraries component could allow an unauthenticated attacker to cause a denial of service resulting in a high availability impact using unknown attack vectors. CVSS Base Score: 7.5 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 159698 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVEID: CVE-2019-2697 DESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java SE 2D component could allow an unauthenticated attacker to take control of the system. CVSS Base Score: 8.1 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 159789 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) CVEID: CVE-2019-2698 DESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java SE 2D component could allow an unauthenticated attacker to take control of the system. CVSS Base Score: 8.1 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 159790 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) CVEID: CVE-2018-1890 DESCRIPTION: IBM SDK, Java Technology Edition Version 8 on the AIX platform uses absolute RPATHs which may facilitate code injection and privilege elevation by local users. CVSS Base Score: 5.6 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 152081 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L) CVEID: CVE-2019-2422 DESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java SE Libraries component could allow an unauthenticated attacker to obtain sensitive information resulting in a low confidentiality impact using unknown attack vectors. CVSS Base Score: 3.1 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 155741 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N) CVEID: CVE-2019-2426 DESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java SE Networking component could allow an unauthenticated attacker to obtain sensitive information resulting in a low confidentiality impact using unknown attack vectors. CVSS Base Score: 3.7 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 155744 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N) CVEID: CVE-2018-11212 DESCRIPTION: libjpeg is vulnerable to a denial of service, caused by divide-by-zero error in the alloc_sarray function in jmemmgr.c. By persuading a victim to open a specially-crafted file, a remote attacker could exploit this vulnerability to cause the application to crash. CVSS Base Score: 3.3 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 143429 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) Affected Products and Versions The following components of IBM Tivoli Monitoring (ITM) are affected by this bulletin: - -Java (CANDLEHOME) ITM 6.3.0 through 6.3.0 Fix Pack 7 (JRE 7) (CVE-2018-1890, CVE-2019-2426, CVE-2019-2697 andCVE-2019-2684) - -Java (Tivoli Enterprise Portal client browser or webstart) ITM 6.3.0 through 6.3.0 Fix Pack 7 (All CVE's listed) Remediation/Fixes Java (TEP) Remediation: These vulnerabilities exist where the affected Java Runtime Environment (JRE) is installed on systems running the Tivoli Enterprise Portal Browser client or Java WebStart client. The affected JRE is installed on a system when logging into the IBM Tivoli Enterprise Portal using the Browser client or WebStart client and a JRE at the required level does not exist. The portal provides an option to download the provided JRE to the system. This fix below provides updated JRE packages for the portal server which can be downloaded by new client systems. Once the fix has been installed on the portal server, instructions in the README can be used to download the updated JRE from the portal to the portal clients. +------------------------------+--------------+-------------------------------+ |Fix |VRMF |How to acquire fix | +------------------------------+--------------+-------------------------------+ |6.X.X-TIV-ITM_JRE_TEP-20190722|6.3.0 through |http://www.ibm.com/support/ | | |6.3.0 FP7 |docview.wssuid=ibm10960430 | +------------------------------+--------------+-------------------------------+ Java (CANDLEHOME) Remediation: The patch below should be installed which will update the shared Tivoli Enterprise-supplied JRE (jr component on UNIX/Linux) or Embedded JVM (JVM component on Windows). +-------------------------------------+-----------+---------------------------+ |Fix |VRMF |How to acquire fix | +-------------------------------------+-----------+---------------------------+ | |6.3.0 |http://www.ibm.com/support/| |6.X.X-TIV-ITM_JRE_CANDLEHOME-20190722|through |docview.wssuid=ibm10960432| | |6.3.0 FP7 | | +-------------------------------------+-----------+---------------------------+ Workarounds and Mitigations None Change History 2019/07/19 Initial Draft 2019/07/25 Published - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXUDk72aOgq3Tt24GAQhRNg//QNLt6K1itNJLe0DbvAnYJyoHv4LfvbIx kauILu6oYcONvR2hiQD2iYGO1YqfdHXDlDYzn+pQiYkffVoMhd/dub95u3028Lez E1Bq3fPXFNbZoePLImEWF4DLiX0QjitdHTroT1Ta04SLl6blgCcCeVIbFQ91NrVt KINjScAjqQZBxIYVDkmYxFSLRf1rCwLQykA/43ADtn6Uk4t5o7+eQ9oimve5GtIi dkxWnSBm2XH8CcXtC7yzVR4Nnm8JQ4qZ2gP36iOAvJda+jsuxt+dVwjJ0YveBaAv qzIWrRg9apy58eAV5ji9bOVwOHJ9ga+LgBbZEhhtUF1WcVMauc0G3JuQAfcSx1gS u/kajwE6biMX5qwROEXsTdmZetfpvumcBNPrC24zd02P54sul+gqXPbcpsGqzt6Y 9c93wbwCHa/G8ZD54fqklXJvm9T/qmjUoUaw3Ql8SQE8xYoRArq+XBcrabS0Obzw RovvVaX9WWhmMXhJu3iE20HTABYgAnCfpkrjrEopVBkeaJlwGvd8gxmRXz/+vH8/ Trdq7TvV+fwEjWJTZAsQfUgf64K7a3o7jcTGffycvWbClSLX7vs1tLkRDzNY7hLF IwQEDfNmEeMQp7xiBYvB8RvJ+6fW2STh7CQBg307Z5yEpuiJMmelE+/fpos72e8Q TNg8mC8+cbw= =qDW6 -----END PGP SIGNATURE-----