Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.4294 Security Bulletin: Multiple vulnerabilities affecting IBM Tivoli Netcool Impact 14 November 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM Tivoli Netcool Publisher: IBM Operating System: AIX Linux variants Windows Solaris Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Increased Privileges -- Existing Account Cross-site Scripting -- Remote with User Interaction Provide Misleading Information -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2019-11771 CVE-2019-11358 CVE-2019-4473 CVE-2018-11775 CVE-2015-9251 Reference: ASB-2019.0303 ASB-2019.0298 ASB-2019.0287 ASB-2019.0221 ASB-2019.0203 ASB-2019.0113 ESB-2019.4091 Original Bulletin: https://www.ibm.com/support/pages/node/1106577 https://www.ibm.com/support/pages/node/1105479 https://www.ibm.com/support/pages/node/1105509 https://www.ibm.com/support/pages/node/1105497 https://www.ibm.com/support/pages/node/1105515 Comment: This bulletin contains five (5) IBM security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- Multiple vulnerabilities in IBM Java SDK affect IBM Tivoli Netcool Impact Security Bulletin Summary There are multiple vulnerabilities in IBM(R) SDK Java(TM) Technology Edition, Version 6, 8 used by IBM Tivoli Netcool Impact. IBM Tivoli Netcool Impact has addressed the applicable CVEs. These issues were also addressed by IBM WebSphere Application Server shipped with IBM Tivoli Netcool Impact. Vulnerability Details CVEID: CVE-2019-4473 DESCRIPTION: Multiple binaries in IBM SDK, Java Technology Edition 7, 7R, and 8 on the AIX platform use insecure absolute RPATHs, which may facilitate code injection and privilege elevation by local users. IBM X-Force ID: 163984. CVSS Base score: 8.4 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 163984 for the current score. CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) CVEID: CVE-2019-11771 DESCRIPTION: AIX builds of Eclipse OpenJ9 before 0.15.0 contain unused RPATHs which may facilitate code injection and privilege elevation by local users. CVSS Base score: 8.4 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 163989 for the current score. CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) Affected Products and Versions IBM Tivoli Netcool Impact 6.1.0.0 - 6.1.0.4 Interim Fix 1 IBM Tivoli Netcool Impact 6.1.1.0 - 6.1.1.5 Interim Fix 2 IBM Tivoli Netcool Impact 7.1.0.0 - 7.1.0.16 Remediation/Fixes +------------------------------+------------+----------------+--------------------------------------------------------------+ | |VRMF |APAR |Remediation/First Fix | +------------------------------+------------+----------------+--------------------------------------------------------------+ |IBM Tivoli Netcool Impact | | | | |7.1.0 |7.1.0.17 |IJ16396 |IBM Tivoli Netcool Impact 7.1.0 FP17 | +------------------------------+------------+----------------+--------------------------------------------------------------+ Refer to the following security bulletins for vulnerability details and information about fixes addressed by IBM WebSphere Application Server shipped with IBM Tivoli Netcool Impact. +-------------------------------------+---------------------------+--------------------------------------------------------+ |Principal Product and Version(s) |Affected Supporting Product|Affected Supporting Product Security Bulletin | | |and Version | | +-------------------------------------+---------------------------+--------------------------------------------------------+ |IBM Tivoli Netcool Impact 6.1.0 |IBM WebSphere Application |Security Bulletin: Multiple Vulnerabilities in IBM Java | |IBM Tivoli Netcool Impact 6.1.1 |Server 7.0 |SDK affect WebSphere Application Server July 2019 CPU | | | | | | | |Since WebSphere Application Server V7 are no longer in | | | |full support; IBM recommends upgrading to IBM Tivoli | | | |Netcool Impact 7.1.0. | +-------------------------------------+---------------------------+--------------------------------------------------------+ Workarounds and Mitigations +------------------------------+------------+----------------+--------------------------------------------------------------+ | |VRMF |APAR |Remediation/First Fix | +------------------------------+------------+----------------+--------------------------------------------------------------+ |IBM Tivoli Netcool Impact | | | | |7.1.0 |7.1.0.17 |IJ16396 |IBM Tivoli Netcool Impact 7.1.0 FP17 | +------------------------------+------------+----------------+--------------------------------------------------------------+ Refer to the following security bulletins for vulnerability details and information about fixes addressed by IBM WebSphere Application Server shipped with IBM Tivoli Netcool Impact. +-------------------------------------+---------------------------+--------------------------------------------------------+ |Principal Product and Version(s) |Affected Supporting Product|Affected Supporting Product Security Bulletin | | |and Version | | +-------------------------------------+---------------------------+--------------------------------------------------------+ |IBM Tivoli Netcool Impact 6.1.0 |IBM WebSphere Application |Security Bulletin: Multiple Vulnerabilities in IBM Java | |IBM Tivoli Netcool Impact 6.1.1 |Server 7.0 |SDK affect WebSphere Application Server July 2019 CPU | | | | | | | |Since WebSphere Application Server V7 are no longer in | | | |full support; IBM recommends upgrading to IBM Tivoli | | | |Netcool Impact 7.1.0. | +-------------------------------------+---------------------------+--------------------------------------------------------+ ============================================================================== IBM Tivoli Netcool Impact is affected by an Apache ActiveMQ vulnerability (CVE-2018-11775) Security Bulletin Summary IBM Tivoli Netcool Impact has addressed the following Apache ActiveMQ vulnerability. Vulnerability Details CVEID: CVE-2018-11775 DESCRIPTION: TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default. CVSS Base score: 5.9 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 149705 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) Affected Products and Versions +---------------------------------------------+-----------------------+ |Affected Product(s) |Version(s) | +---------------------------------------------+-----------------------+ |IBM Tivoli Netcool Impact 7.1.0 |7.1.0.0~7.1.0.16 | +---------------------------------------------+-----------------------+ Remediation/Fixes +------------------------------+------------+----------------+--------------------------------------------------------------+ | |VRMF |APAR |Remediation/First Fix | +------------------------------+------------+----------------+--------------------------------------------------------------+ |IBM Tivoli Netcool Impact | | | | |7.1.0 |7.1.0.17 |IJ17917 |IBM Tivoli Netcool Impact 7.1.0 FP17 | +------------------------------+------------+----------------+--------------------------------------------------------------+ Workarounds and Mitigations +------------------------------+------------+----------------+--------------------------------------------------------------+ | |VRMF |APAR |Remediation/First Fix | +------------------------------+------------+----------------+--------------------------------------------------------------+ |IBM Tivoli Netcool Impact | | | | |7.1.0 |7.1.0.17 |IJ17917 |IBM Tivoli Netcool Impact 7.1.0 FP17 | +------------------------------+------------+----------------+--------------------------------------------------------------+ Get Notified about Future Security Bulletins References ============================================================================== IBM Tivoli Netcool Impact is affected by a jQuery vulnerability (CVE-2019-11358) Security Bulletin Summary IBM Tivoli Netcool Impact has addressed the following jQuery vulnerability. Vulnerability Details CVEID: CVE-2019-11358 DESCRIPTION: jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. CVSS Base score: 6.1 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 159633 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) Affected Products and Versions +------------------------------------------+----------------------+ |Affected Product(s) |Version(s) | +------------------------------------------+----------------------+ |IBM Tivoli Netcool Impact 7.1.0 |7.1.0.0~7.1.0.16 | +------------------------------------------+----------------------+ Remediation/Fixes +------------------------------+------------+----------------+--------------------------------------------------------------+ | |VRMF |APAR |Remediation/First Fix | +------------------------------+------------+----------------+--------------------------------------------------------------+ |IBM Tivoli Netcool Impact | | | | |7.1.0 |7.1.0.17 |IJ17708 |IBM Tivoli Netcool Impact 7.1.0 FP17 | +------------------------------+------------+----------------+--------------------------------------------------------------+ Workarounds and Mitigations +------------------------------+------------+----------------+--------------------------------------------------------------+ | |VRMF |APAR |Remediation/First Fix | +------------------------------+------------+----------------+--------------------------------------------------------------+ |IBM Tivoli Netcool Impact | | | | |7.1.0 |7.1.0.17 |IJ17708 |IBM Tivoli Netcool Impact 7.1.0 FP17 | +------------------------------+------------+----------------+--------------------------------------------------------------+ Get Notified about Future Security Bulletins References ============================================================================== IBM Tivoli Netcool Impact is affected by a jQuery vulnerability (CVE-2015-9251) Security Bulletin Summary IBM Tivoli Netcool Impact has addressed the following jQuery vulnerability. Vulnerability Details CVEID: CVE-2015-9251 DESCRIPTION: jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed. CVSS Base score: 6.1 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 138029 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) Affected Products and Versions +---------------------------------------+--------------------+ |Affected Product(s) |Version(s) | +---------------------------------------+--------------------+ |IBM Tivoli Netcool Impact 7.1.0 |7.1.0.0~7.1.0.16 | +---------------------------------------+--------------------+ Remediation/Fixes +------------------------------+------------+----------------+--------------------------------------------------------------+ | |VRMF |APAR |Remediation/First Fix | +------------------------------+------------+----------------+--------------------------------------------------------------+ |IBM Tivoli Netcool Impact | | | | |7.1.0 |7.1.0.17 |IJ18822 |IBM Tivoli Netcool Impact 7.1.0 FP17 | +------------------------------+------------+----------------+--------------------------------------------------------------+ Workarounds and Mitigations +------------------------------+------------+----------------+--------------------------------------------------------------+ | |VRMF |APAR |Remediation/First Fix | +------------------------------+------------+----------------+--------------------------------------------------------------+ |IBM Tivoli Netcool Impact | | | | |7.1.0 |7.1.0.17 |IJ18822 |IBM Tivoli Netcool Impact 7.1.0 FP17 | +------------------------------+------------+----------------+--------------------------------------------------------------+ Get Notified about Future Security Bulletins References ============================================================================== IBM Tivoli Netcool Impact Configuration and Deployment Management Clickjacking Security Bulletin Summary IBM Tivoli Netcool Impact did not handle Clickjacking. Vulnerability Details Third Party Entry: PSIRT-ADV0014970 DESCRIPTION: CVSS Base score: 5.4 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N Affected Products and Versions +------------------------------------------+---------------------+ |Affected Product(s) |Version(s) | +------------------------------------------+---------------------+ |IBM Tivoli Netcool Impact 7.1.0 |7.1.0.0~7.1.0.16 | +------------------------------------------+---------------------+ Remediation/Fixes +------------------------------+------------+----------------+--------------------------------------------------------------+ | |VRMF |APAR |Remediation/First Fix | +------------------------------+------------+----------------+--------------------------------------------------------------+ |IBM Tivoli Netcool Impact | | | | |7.1.0 |7.1.0.17 |IJ17927 |IBM Tivoli Netcool Impact 7.1.0 FP17 | +------------------------------+------------+----------------+--------------------------------------------------------------+ Workarounds and Mitigations +------------------------------+------------+----------------+--------------------------------------------------------------+ | |VRMF |APAR |Remediation/First Fix | +------------------------------+------------+----------------+--------------------------------------------------------------+ |IBM Tivoli Netcool Impact | | | | |7.1.0 |7.1.0.17 |IJ17927 |IBM Tivoli Netcool Impact 7.1.0 FP17 | +------------------------------+------------+----------------+--------------------------------------------------------------+ Get Notified about Future Security Bulletins References - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXczrhmaOgq3Tt24GAQhNyBAAn7rvBxtYV652ofAj+3wGM8gSu3oW7+Le aK2xm/0wkitCrl0Oke2y9x8F5ergAWbkmWMGnbOsHcTeICYVIn0L+fq+5t5oUoY4 VYK4n0etUPYeeTpdHlc7LWn+RpmDGi5lR2wMr3V4uM7jT49/V3yeBCqVcAKcFdRT X3N8Bid69oiQTyUzamfPABRlTJQjRKNwDamCX5gdUYsUbcOd/yF18NyW0qjiYojL dI6sj0Xm12szL+X4fllWNIVljGn93ZAg0XQuPDFiBgkTFvakwXqKoezHQQlysUUP YEXJv/41pXYvBVkSdWcf6LkQuZa38XMYwyIn66Hvd1iGGLhfgHr45wpanSu1w36p rJwgKFpQlppiYkbrrAiTNCdrOzx4CFxUOvs12pR1kxA1QR7VALh8hW1u/0SknA8K J5HibW24BgFyXeqDhXZrZNw/7R9Lj49rlnpZTaRgqitGSq5vM/g2AgpTIg62FfI8 pwALRjJjsxXkg9lh+nHnwR2R8zaMVdN3u6l+aFKow0o0GKUoA1aQ6BruDAVi8E9F hCKk1xr95QWLw1k352Bnv9sQTywIvchzaoHsTaFrkZ3b+94Lml5kexX8zEu2BvjT /iOEp0JnAl21+t8ZbHYXKAd6pWSkYG5E9jpP1sEf5y+o2z6H2j3B3ctm+yHn7K8I tM6dV7hfyo4= =q3cV -----END PGP SIGNATURE-----