23 December 2019
Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.4780 Security Bulletin: Vulnerabilities in Curl affect PowerSC (CVE-2019-5435, CVE-2019-5436) 23 December 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM PowerSC Express Edition Publisher: IBM Operating System: AIX Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-5436 CVE-2019-5435 Reference: ESB-2019.2839 ESB-2019.2392 ESB-2019.1917 Original Bulletin: https://www.ibm.com/support/pages/node/1108041 - --------------------------BEGIN INCLUDED TEXT-------------------- Security Bulletin: Vulnerabilities in Curl affect PowerSC (CVE-2019-5435, CVE-2019-5436) Document Information Product : PowerSC Express Edition Component : PowerSC Software version : 1.2 Operating system(s): AIX Edition : All Summary There are vulnerabilities in Curl that affect PowerSC. Vulnerability Details CVEID: CVE-2019-5435 DESCRIPTION: An integer overflow in curl's URL API results in a buffer overflow in libcurl 7.62.0 to and including 7.64.1. CVSS Base score: 7.3 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities /161429 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) CVEID: CVE-2019-5436 DESCRIPTION: A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1. CVSS Base score: 6.3 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities /161431 for the current score. CVSS Vector: (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) Affected Products and Versions +-------------------+----------+ |Affected Product(s)|Version(s)| +-------------------+----------+ |PowerSC |1.2 | +-------------------+----------+ The following fileset levels are vulnerable: Fileset Lower Level Upper Level powerscStd.tnc_pm 18.104.22.168 22.214.171.124 curl-7.65.1-1.aix6.1.ppc.rpm 7.19.4 7.64.1 Note: To find out whether the affected PowerSC filesets are installed on your systems, refer to the lslpp command found in AIX user's guide. Example: rpm -qa | grep curl Remediation/Fixes A. FIXES Fixes are available. The fixes can be downloaded via ftp or http from: ftp://aix.software.ibm.com/aix/efixes/powersc/security/curl_fix.tar http://aix.software.ibm.com/aix/efixes/powersc/security/curl_fix.tar https://aix.software.ibm.com/aix/efixes/powersc/security/curl_fix.tar The link above is a tar file containing this signed advisory, open source fix packages, and OpenSSL signatures for each package. To extract the fixes from the tar file: tar xvf curl_fix.tar cd curl_fix Verify you have retrieved the fixes intact: The checksums below were generated using the "openssl dgst -sha256 [filename]" command as the following: openssl dgst -sha256 filename KEY - ----------------------------------------------------------------------------------------------------------------------- 56e394405836f1bdf7d188cef30adf5f6151fe594b39576dfbd953435e192569 ca-certificates-2016.10.7-2.aix6.1.ppc.rpm key_w_csum 5f01da544ae221c3f98ecd864782597b326f7838bb759cbb44b8366cad2eaeee curl-7.65.1-1.aix6.1.ppc.rpm key_w_csum 3ef01f3aea3e62ce402158ea892dfdb101d2c2f1c06256c6a245dc3126610bc0 db-6.2.32-2.aix6.1.ppc.rpm key_w_csum 7d1b39e1b8ab29a33edf9bb8fb589e071a6e0e06b69182f8a08776f497715f49 krb5-libs-1.16.1-2.aix6.1.ppc.rpm key_w_csum dfd52c9b162b075abdaea908910ade3ee13d923e36a7e45cf6e1308ef5e62b52 libgcc-8.1.0-2.aix7.2.ppc.rpm key_w_csum These sums should match exactly. The OpenSSL signatures in the tar file and on this advisory can also be used to verify the integrity of the fixes. If the sums or signatures cannot be confirmed, contact IBM Support. openssl dgst -sha1 -verify <pubkey_file> -signature <advisory_file>.sig <advisory_file> openssl dgst -sha1 -verify <pubkey_file> -signature <ifix_file>.sig <ifix_file> Published advisory OpenSSL signature file location: http://aix.software.ibm.com/aix/efixes/powersc/security/curl_advisory.asc.sig https://aix.software.ibm.com/aix/efixes/powersc/security/curl_advisory.asc.sig ftp://aix.software.ibm.com/aix/efixes/powersc/security/curl_advisory.as... B. FIX AND INTERIM FIX INSTALLATION IMPORTANT: If possible, it is recommended that a mksysb backup of the system be created. Verify it is both bootable and readable before proceeding. To extract the fixes from the tar file: tar xvf curl_fix.tar cd curl_fix To install a fix package: rpm -ivh *.rpm rpm -Uvh *.rpm Interim fixes have had limited functional and regression testing but not the full regression testing that takes place for Service Packs; however, IBM does fully support them. Workarounds and Mitigations None. Change History 11 Nov 2019: Initial Publication *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. Document Location Worldwide - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to email@example.com and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: firstname.lastname@example.org Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXgBCEWaOgq3Tt24GAQivHw/9H6hgJjjRPQVZ6b5kv39LTEyLqD8dfBEO kk/AGZxLAGpuKn4bu1hAyPACxoidYedDEYbUzahGpQpsbLmRa+6n0AtXyO5hOnHx hHhHzcw1mNDSc91SEKSnz45Z41gIbN2++7hWAVnZDoemZ48BlCrCWFXAs4fNLobF mzP+LZVkmOG3RfXo8Si/w80uBgzwDncoCk5xaRKiaGuUke2w2DBcR8Pg3NECR8Wp 5/bZMWj2l7ORKXjoUVyXjz2O8I+jh/GfuFEScxwijqNpMi32jil70sUAldn3887F 8JnFkVZCAlTZhzYOjBKHf13Zh94f9w+1iUek5eQGwgXiHPcOWS2tArg4sK1t3A9y 28ZmwonLB/bKIwS5FLdz7DKF+vjOVy5NbXPL4Nni5HDX31YE/F4XY0vKGngtbRGD A7RYA0t/uhFsk4EgHGG+aAsGrSW/kvaFqQ0vugHLyQGL3ewzCpzXpEosrHqXQ4ju llVtHn7USrSKIAho78lQYRdeGVkPW0rVzapyGZCr7jFqUDVcTviGKucaz79yjHJ5 0M/gnijsjycAO24v1UiwKKZPfPkiak6Bz4EuiQd4UnJLoANsxWyMx/342uICEfrY DvQRs8kygTLEQTRhNMZdaxsgfHDbrtTTn7jgAZvp9O4+VbJN794KSbr4WAO1wCtO Oj/d8YATiT8= =QqNh -----END PGP SIGNATURE-----