Date: 05 December 2012
References: ASB-2012.0143 ASB-2012.0144 ESB-2012.0998 ESB-2012.0999 ESB-2012.1003 ESB-2012.1004 ESB-2012.1090 ESB-2012.1187 ESB-2013.0021 ESB-2013.0051 ESB-2013.0053 ESB-2013.0123 ESB-2013.0156 ESB-2013.0157
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2012.1147
Security Bulletin: Potential security vulnerabilities in WebSphere
Application Server products for the Oracle October 2012 CPU
5 December 2012
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: WebSphere Application Server
Publisher: IBM
Operating System: AIX
HP-UX
Linux variants
Solaris
Windows
IBM i
i5/OS
z/OS
Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Access Privileged Data -- Remote/Unauthenticated
Modify Arbitrary Files -- Remote/Unauthenticated
Delete Arbitrary Files -- Remote/Unauthenticated
Denial of Service -- Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2012-5089 CVE-2012-5088 CVE-2012-5087
CVE-2012-5086 CVE-2012-5085 CVE-2012-5084
CVE-2012-5083 CVE-2012-5082 CVE-2012-5081
CVE-2012-5080 CVE-2012-5079 CVE-2012-5078
CVE-2012-5077 CVE-2012-5076 CVE-2012-5075
CVE-2012-5074 CVE-2012-5073 CVE-2012-5072
CVE-2012-5071 CVE-2012-5070 CVE-2012-5069
CVE-2012-5068 CVE-2012-5067 CVE-2012-4416
CVE-2012-3216 CVE-2012-3159 CVE-2012-3143
CVE-2012-1533 CVE-2012-1532 CVE-2012-1531
Reference: ASB-2012.0144
ASB-2012.0143
ESB-2012.1090
ESB-2012.1004
ESB-2012.1003
ESB-2012.0999
ESB-2012.0998
Original Bulletin:
http://www-01.ibm.com/support/docview.wss?uid=swg21617227
- --------------------------BEGIN INCLUDED TEXT--------------------
Security Bulletin: Potential security vulnerabilities in WebSphere Application
Server products for the Oracle October 2012 CPU
Flash (Alert)
Document information
WebSphere Application Server
General
Software version:
6.1, 7.0, 8.0, 8.5
Operating system(s):
AIX, HP-UX, IBM i, Linux, Solaris, Windows, i5/OS, z/OS
Software edition:
Base, Developer, Express, Network Deployment
Reference #:
1617227
Modified date:
2012-12-04
Abstract
The IBM WebSphere Application Server is shipped with an IBM Java JDK that is
based on the Oracle JDK. Oracle has released October 2012 critical patch
updates (CPU) which contain security vulnerability fixes and the IBM Java JDK
that WebSphere Application Server ships is affected.
Content
Versions affected:
* JDK shipped with IBM WebSphere Application Server Version 8.5.0.0 through
8.5.0.1, Version 8.0.0.0 through 8.0.0.5, Version 7.0.0.0 through 7.0.0.25,
Version 6.1.0.0 through 6.1.0.45
* This does not occur on JDK versions shipped with WebSphere Application
Servers 8.5.0.2, 8.0.0.6, 7.0.0.27 and 6.1.0.47 or later.
Description:
This Security Bulletin addresses the security vulnerabilities
that have shipped with the IBM JDK and is part of the Oracle October 2012
critical patch updates (CPU). For details on these updates please refer to the
Reference section of this bulletin.
Solutions:
Upgrade your JDK to an interim fix level as determined below:
For IBM WebSphere Application Server for distributed operating systems and IBM
WebSphere Application Server Hypervisor Edition :
Download and apply the interim fix APARs below, for your appropriate release:
For V8.5.0.0 through 8.5.0.1:
Apply Interim Fix PM75382: Will upgrade you to JDK 6 2.6 SR4
- --OR--
Apply Interim Fix PM75383: Will upgrade you to JDK 7 SR3
- --OR--
Apply Java SDK shipped with WebSphere Application Server Fix pack 2
(8.5.0.2) or later (targeted to be available mid April 2013).
For 8.0.0.0 through 8.0.0.5:
Apply Interim Fix PM75381: Will upgrade you to JDK 6 2.6 SR4
- --OR--
Apply Java SDK shipped with WebSphere Application Server Fix pack 6
(8.0.0.6) or later (targeted to be available late April 2013).
For V7.0.0.0 through 7.0.0.25:
Apply Interim Fix PM75379: Will upgrade you to JDK 6 SR12
- --OR--
Apply Java SDK shipped with WebSphere Application Server Fix pack 27
(7.0.0.27) or later (targeted to be available late January 2013).
For V6.1.0.0 through 6.1.0.45:
Apply Interim Fix PM75378: Will upgrade you to JDK 5 SR15
- --OR--
Apply Java SDK shipped with WebSphere Application Server Fix pack 47
(6.1.0.47) or later (check back for estimated date).
For IBM WebSphere Application Server for i5/OS operating systems:
The IBM Developer Kit for Java is prerequisite software for WebSphere
Application Server for IBM i.
For Versions 8.5.0.0 through 8.5.0.1:
Apply all of the PTFs matching one of these Developer Kit for Java options
and the version of IBM i installed on your system from the chart below.
For Versions 8.0.0.0 through 8.0.0.5:
Apply all of the PTFs matching one of these Developer Kit for Java options
and the version of IBM i installed on your system from the chart below.
For Versions 7.0 through 7.0.0.25:
Apply all of the PTFs matching one of these Developer Kit for Java options
and the version of IBM i installed on your system from the chart below.
For Versions 6.1 through 6.1.0.45:
Apply all of the PTFs matching one of these Developer Kit for Java options
and the version of IBM i installed on your system from the chart below.
Java Developer Kit 5.0 32 bit Java Developer Kit 5.0 64 bit Java Developer Kit 6.0 32 bit Java Developer Kit 6.0 64 bit Java Developer Kit 6.2.6 32 bit Java Developer Kit 6.2.6 64 bit Java Developer Kit 7.0 32 bit Java Developer Kit 7.0 64 bit
V5R4 SI48515 N/A SI48554 N/A N/A N/A N/A N/A
SI48514 SI48559
IBM i 6.1 SI48512 SI48513 SI48541 SI48543 TBD* TBD* N/A N/A
SI48516 SI48518 SI48558 SI48605
SI48621
IBM i 7.1 SI48512 SI48513 SI48541 SI48543 TBD* TBD* TBD* TBD*
SI48516 SI48518 SI48558 SI48605
SI48621
TBD - to be determined. The table will be updated with the PTFs as soon as
they become available.
For WebSphere Application Server for z/OS operating systems:
For V8.5.0.0 through 8.5.0.1:
Apply Interim Fix PM75382: Will upgrade you to JDK 6 2.6 SR4
- --OR--
Apply Interim Fix PM75383: Will upgrade you to JDK 7 SR3
- --OR--
Apply Java SDK shipped with WebSphere Application Server Fix pack 2
(8.5.0.2) or later (targeted to be available mid April 2013).
For V8.0.0.0 through 8.0.0.5:
Apply Interim Fix PM75381: Will upgrade you to JDK 6 2.6 SR4
- --OR--
Apply Java SDK shipped with WebSphere Application Server Fix Pack 6
(8.0.0.6) or later (targeted to be available late April 2013).
For V7.0.0.0 through 7.0.0.25:
Open a Problem Management Record (PMR) with IBM WebSphere Application
Server support to request ++APARs for PM75379 Please include, in the PMR,
your WebSphere Application Server Fix Pack level, as well as any
additional ++APARs and Feature Packs that you have installed
- -OR-
Apply Java SDK shipped with WebSphere Application Server Fix Pack
7.0.0.27, or later, at APAR/PTF Tables by version for IBM WebSphere
Application Server for z/OS (targeted to be available late January 2013)
For V6.1.0.0 through 6.1.0.45:
Open a Problem Management Record (PMR) with IBM WebSphere Application
Server support to request a ++APAR for PM75378 Please include, in the PMR,
your WebSphere Application Server Fix Pack level, as well as any
additional ++APARs and Feature Packs that you have installed.
- --OR--
Apply Java SDK shipped with WebSphere Application Server Fix Pack
6.1.0.47, or later, at APAR/PTF Tables by version for IBM WebSphere
Application Server for z/OS. (check back for estimated date)
For additional details and information on WebSphere Application Server product
updates:
For Distributed, see Recommended fixes for WebSphere Application Server.
For i5/OS, see WebSphere Application Server for i5/OS. For z/OS, see
APAR/PTF Tables by version for IBM WebSphere Application Server for z/OS.
Change history
04 Dec 2012: Original publish date
REFERENCES:
IBM Security Alerts: Oracle October 2012 Security Alert. Oracle Java SE
Critical Patch Update Advisory - June 2012: Oracle Java SE Critical Patch
Update Advisory - October 2012. Java on IBM i Complete CVSS Guide
http://www.first.org/cvss/cvss-guide.html On-line Calculator V2
http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2
*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Flash.
Note: According to the Forum of Incident Response and Security Teams (FIRST),
the Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=AXjU
-----END PGP SIGNATURE-----
|