ESB-2017.1585 - [Win][Linux][IBM i][HP-UX][Solaris][AIX] IBM Sterling B2B Integrator: Multiple vulnerabilities 2017-06-23

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.1585
           Multiple vulnerabilities have been identified in IBM
                          Sterling B2B Integrator
                               23 June 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Sterling B2B Integrator
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   IBM i
                   Linux variants
                   Solaris
                   Windows
Impact/Access:     Access Privileged Data          -- Remote/Unauthenticated      
                   Execute Arbitrary Code/Commands -- Existing Account            
                   Modify Arbitrary Files          -- Existing Account            
                   Denial of Service               -- Remote/Unauthenticated      
                   Cross-site Scripting            -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-3732 CVE-2017-3730 CVE-2017-1349
                   CVE-2017-1348 CVE-2017-1347 CVE-2017-1326
                   CVE-2017-1302 CVE-2017-1193 CVE-2017-1192
                   CVE-2017-1174 CVE-2017-1152 CVE-2017-1132
                   CVE-2017-1131 CVE-2016-9983 CVE-2016-9982
                   CVE-2016-8610 CVE-2016-7055 CVE-2016-5893
                   CVE-2008-7220  

Reference:         ASB-2017.0059
                   ASB-2017.0055
                   ASB-2017.0047
                   ASB-2017.0021
                   ESB-2016.2723
                   ESB-2016.2585
                   ESB-2009.1641
                   ESB-2009.1487.2

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=swg22004270
   http://www.ibm.com/support/docview.wss?uid=swg22004262
   http://www.ibm.com/support/docview.wss?uid=swg22004202
   http://www.ibm.com/support/docview.wss?uid=swg22004273
   http://www.ibm.com/support/docview.wss?uid=swg22004199
   http://www.ibm.com/support/docview.wss?uid=swg22004195
   http://www.ibm.com/support/docview.wss?uid=swg22004260
   http://www.ibm.com/support/docview.wss?uid=swg22004268
   http://www.ibm.com/support/docview.wss?uid=swg22004209
   http://www.ibm.com/support/docview.wss?uid=swg22004269
   http://www.ibm.com/support/docview.wss?uid=swg22004274
   http://www.ibm.com/support/docview.wss?uid=swg22004272
   http://www.ibm.com/support/docview.wss?uid=swg22004267

Comment: This bulletin contains thirteen (13) IBM security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: HTTP verb tampering vulnerability affects IBM Sterling
B2B Integrator (CVE-2017-1131)

Document information

More support for: Sterling B2B Integrator

Software version: 5.2, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.2.6

Operating system(s): AIX, HP-UX, IBM i, Linux, Solaris, Windows

Reference #: 2004270

Modified date: 21 June 2017

Security Bulletin

Summary

IBM Sterling B2B Integrator Standard Edition could allow an authenticated
user to obtain sensitive information by using unsupported, specially
crafted HTTP commands.

Vulnerability Details

CVEID: CVE-2017-1131
DESCRIPTION: IBM Sterling B2B Integrator Standard Edition could allow an
authenticated user to obtain sensitive information by using unsupported,
specially crafted HTTP commands.
CVSS Base Score: 4.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/121375 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

IBM Sterling B2B Integrator 5.2

Remediation/Fixes

Product & Version			APAR	Remediation/Fix
IBM Sterling B2B Integrator 5.2		IT18965	Apply B2B Integrator
						fix pack 5020603_2 on Fix Central

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References
Complete CVSS v3 Guide
On-line Calculator v3

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

15 June 2017: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- ---

Security Bulletin: JavaScript vulnerability affects IBM Sterling B2B
Integrator (CVE-2008-7220)

Document information

More support for: Sterling B2B Integrator

Software version: 5.2, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.2.6

Operating system(s): AIX, HP-UX, IBM i, Linux, Solaris, Windows

Reference #: 2004262

Modified date: 21 June 2017

Security Bulletin

Summary

An unspecified error in the Prototype JavaScript framework (prototype.js),
as used in multiple products, could allow a remote attacker to conduct
cross-site Ajax requests using unknown attack vectors. Note: This
vulnerability affects the ajax based manager interface, ajamdemo.html,
in certain versions of Asterisk.

Vulnerability Details

CVEID: CVE-2008-7220
DESCRIPTION: An unspecified error in the Prototype JavaScript framework
(prototype.js), as used in multiple products, could allow a remote attacker
to conduct cross-site Ajax requests using unknown attack vectors. Note:
This vulnerability affects the ajax based manager interface, ajamdemo.html,
in certain versions of Asterisk.
CVSS Base Score: 4.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/53652 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Affected Products and Versions

IBM Sterling B2B Integrator 5.2

Remediation/Fixes

Product & Version			APAR		Remediation/Fix
IBM Sterling B2B Integrator 5.2		IT19688		Apply B2B Integrator
							fix pack 5020603_2 or 5020602_4 on Fix Central

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References
Complete CVSS v3 Guide
On-line Calculator v3

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

15 June 2017: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- ---
Security Bulletin: Multiple Information disclosure vulnerabilities affect
IBM Sterling B2B Integrator (CVE-2017-1302, CVE-2017-1193)

Document information

More support for: Sterling B2B Integrator

Software version: 5.2, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.2.6

Operating system(s): AIX, HP-UX, IBM i, Linux, Solaris, Windows

Reference #: 2004202

Modified date: 21 June 2017

Security Bulletin

Summary

IBM Sterling B2B Integrator Standard Edition could allow a local user to
view sensitive information due to improper access controls

Vulnerability Details

CVEID: CVE-2017-1302
DESCRIPTION: IBM Sterling B2B Integrator Standard Edition could allow a
local user to view sensitive information due to improper access controls.
CVSS Base Score: 4
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/125456 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2017-1193
DESCRIPTION: IBM Sterling B2B Integrator Standard Edition could allow a
user to obtain sensitive information using an HTTP GET request.
CVSS Base Score: 4.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/123667 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

IBM Sterling B2B Integrator 5.2

Remediation/Fixes

Product & Version			APAR			Remediation/Fix
IBM Sterling B2B Integrator 5.2		IT19901  IT19740	Apply B2B Integrator
								fix pack 5020603_2 or
								5020602_4 on Fix 
								Central

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References
Complete CVSS v3 Guide
On-line Calculator v3

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

15 June 2017: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- ---
Security Bulletin: Multiple access control vulnerabilities affect IBM
Sterling B2B Integrator (CVE-2016-9983, CVE-2016-9982)

Document information

More support for: Sterling B2B Integrator

Software version: 5.2, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.2.6

Operating system(s): AIX, HP-UX, IBM i, Linux, Solaris, Windows

Reference #: 2004273

Modified date: 21 June 2017

Security Bulletin

Summary

IBM Sterling B2B Integrator Standard Edition could allow an authenticate
user with special privileges to view files and web pages that they should
not have access to.

Vulnerability Details

CVEID: CVE-2016-9983
DESCRIPTION: IBM Sterling B2B Integrator Standard Edition could allow an
authenticate user with special privileges to view files that they should
not have access to.
CVSS Base Score: 3.1
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/120275 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2016-9982
DESCRIPTION: IBM Sterling B2B Integrator Standard Edition could allow an
authenticated user to obtain sensitive information such as account lists
due to improper access control.
CVSS Base Score: 4.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/120274 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

IBM Sterling B2B Integrator 5.2

Remediation/Fixes

Product & Version			APAR	Remediation/Fix
IBM Sterling B2B Integrator 5.2		IT18949	Apply B2B Integrator fix 
						pack 5020603_2, 5020602_4 
						or 5020601_7 on Fix Central

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References
Complete CVSS v3 Guide
On-line Calculator v3

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

15 June 2017: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- ---
Security Bulletin: Multiple vulnerabilities in EBICS client in IBM Sterling
B2B Integrator (CVE-2017-1132, CVE-2017-1347, CVE-2017-1348)

Document information

More support for: Sterling B2B Integrator

Software version: 5.2, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.2.6

Operating system(s): AIX, HP-UX, IBM i, Linux, Solaris, Windows

Reference #: 2004199

Modified date: 21 June 2017

Security Bulletin

Summary

OpenSSL vulnerabilities were disclosed by the OpenSSL Project. OpenSSL
is used by IBM Sterling B2B Integrator. IBM Sterling B2B Integrator has
addressed the applicable CVEs.

Vulnerability Details

CVEID: CVE-2017-1132
DESCRIPTION: IBM Sterling B2B Integrator Standard Edition is vulnerable to
cross-site scripting. This vulnerability allows users to embed arbitrary
JavaScript code in the Web UI thus altering the intended functionality
potentially leading to credentials disclosure within a trusted session.
CVSS Base Score: 5.4
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/121418 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)

CVEID: CVE-2017-1347
DESCRIPTION: IBM Sterling B2B Integrator Standard Edition is vulnerable to
SQL injection. A remote attacker could send specially crafted SQL statements,
which could allow the attacker to view, add, modify or delete information
in the back-end database.
CVSS Base Score: 6.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/126462 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)

CVEID: CVE-2017-1348
DESCRIPTION: IBM Sterling B2B Integrator Standard Edition is vulnerable to
cross-site scripting. This vulnerability allows users to embed arbitrary
JavaScript code in the Web UI thus altering the intended functionality
potentially leading to credentials disclosure within a trusted session.
CVSS Base Score: 5.4
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/126524 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

IBM Sterling B2B Integrator 5.2

Remediation/Fixes

Product & Version			APAR				Remediated Fix
IBM Sterling B2B Integrator 5.2		IT18265, IT20381, IT20451	EBICS client customers 
									must upgrade their B2B 
									Integrator 5020603_2 on 
									Fix Central and then 
									install v_ebics_client_1000603_2.jar 
									in <SI_Install_Dir>/packages
									using InstallService.sh or 
									InstallService.cmd

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References
Complete CVSS v3 Guide
On-line Calculator v3

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

15 June 2017: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- ---

Security Bulletin: Multiple vulnerabilities in OpenSSL affect IBM Sterling
B2B Integrator (CVE-2017-3730, CVE-2017-3732, CVE-2016-7055, CVE-2016-8610)

Document information

More support for: Sterling B2B Integrator

Software version: 5.2, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.2.6

Operating system(s): AIX, HP-UX, IBM i, Linux, Solaris, Windows

Reference #: 2004195

Modified date: 21 June 2017

Security Bulletin

Summary

OpenSSL vulnerabilities were disclosed by the OpenSSL Project. OpenSSL
is used by IBM Sterling B2B Integrator. IBM Sterling B2B Integrator has
addressed the applicable CVEs.

Vulnerability Details

CVEID: CVE-2017-3730
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by a NULL
pointer dereference. By sending specially crafted parameters for a DHE or
ECDHE key exchange, a remote attacker could exploit this vulnerability to
cause the application to crash.
CVSS Base Score: 5.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/121311 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2017-3732
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by a propagation error in the BN_mod_exp() function. An
attacker could exploit this vulnerability to obtain information about the
private key.
CVSS Base Score: 5.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/121313 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2016-7055
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by an
error in a Broadwell-specific Montgomery multiplication procedure. By sending
specially crafted data, a remote attacker could exploit this vulnerability
to trigger errors in public-key operations in configurations where multiple
remote clients select an affected EC algorithm and cause a denial of service.
CVSS Base Score: 5.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/118748 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2016-8610
DESCRIPTION: SSL/TLS protocol is vulnerable to a denial of service, caused
by an error when processing ALERT packets during a SSL handshake. By
sending specially crafted packets, a remote attacker could exploit this
vulnerability to cause the application to stop responding.
CVSS Base Score: 7.5
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/118296 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

IBM Sterling B2B Integrator 5.2

Remediation/Fixes

Product & Version			Remediated Fix
IBM Sterling B2B Integrator 5.2		SWIFTNet Customers must upgrade
					their B2B Integrator 5020603_2, 
					5020602_4 or 5020601_7 on Fix Central and
					current version of OpenSSL to version 1.0.2k

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References
Complete CVSS v3 Guide
On-line Calculator v3

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

15 June 2017: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
- ---

Security Bulletin: Permission checking vulnerability affects IBM Sterling
B2B Integrator (CVE-2017-1326)

Document information

More support for: Sterling B2B Integrator

Software version: 5.2, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.2.6

Operating system(s): AIX, HP-UX, IBM i, Linux, Solaris, Windows

Reference #: 2004260

Modified date: 21 June 2017

Security Bulletin

Summary

IBM Sterling File Gateway does not properly restrict user requests based
on permission level. This allows for users to update data related to other
users, by manipulating the parameters passed in the POST request.

Vulnerability Details

CVEID: CVE-2017-1326
DESCRIPTION: IBM Sterling File Gateway does not properly restrict user
requests based on permission level. This allows for users to update data
related to other users, by manipulating the parameters passed in the
POST request.
CVSS Base Score: 4.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/126060 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)

Affected Products and Versions

IBM Sterling B2B Integrator 5.2

Remediation/Fixes

Product & Version			APAR		Remediation/Fix
IBM Sterling B2B Integrator 5.2		IT20411		Apply B2B Integrator
							fix pack 5020603_2 on
							Fix Central

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References
Complete CVSS v3 Guide
On-line Calculator v3

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

15 June 2017: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- ---
Security Bulletin: SQL injection vulnerability affects IBM Sterling B2B
Integrator (CVE-2017-1174)

Document information

More support for: Sterling B2B Integrator

Software version: 5.2, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.2.6

Operating system(s): AIX, HP-UX, IBM i, Linux, Solaris, Windows

Reference #: 2004268

Modified date: 21 June 2017

Security Bulletin

Summary

IBM Sterling B2B Integrator Standard Edition is vulnerable to SQL
injection. A remote attacker could send specially crafted SQL statements,
which could allow the attacker to view, add, modify or delete information
in the back-end database.

Vulnerability Details

CVEID: CVE-2017-1174
DESCRIPTION: IBM Sterling B2B Integrator Standard Edition is vulnerable to
SQL injection. A remote attacker could send specially crafted SQL statements,
which could allow the attacker to view, add, modify or delete information
in the back-end database.
CVSS Base Score: 7.6
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/123296 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L)

Affected Products and Versions

IBM Sterling B2B Integrator 5.2

Remediation/Fixes

Product & Version			APAR		Remediation/Fix
IBM Sterling B2B Integrator 5.2		IT20226		Apply B2B Integrator fix pack 5020603_2
							or 5020602_4 on Fix Central

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References
Complete CVSS v3 Guide
On-line Calculator v3

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

15 June 2017: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- ---
Security Bulletin: Sensitive data protection vulnerability affects IBM
Sterling B2B Integrator (CVE-2017-1349)

Document information

More support for: Sterling B2B Integrator

Software version: 5.2, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.2.6

Operating system(s): AIX, HP-UX, IBM i, Linux, Solaris, Windows

Reference #: 2004209

Modified date: 21 June 2017

Security Bulletin

Summary

IBM Sterling B2B Integrator Standard Edition stores potentially sensitive
information from HTTP sessions that could be read by a local user.

Vulnerability Details

CVEID: CVE-2017-1349
DESCRIPTION: IBM Sterling B2B Integrator Standard Edition stores potentially
sensitive information from HTTP sessions that could be read by a local user.
CVSS Base Score: 4
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/126525 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

IBM Sterling B2B Integrator 5.2

Remediation/Fixes

Product & Version			APAR		Remediation/Fix
IBM Sterling B2B Integrator 5.2		IT20050		Apply B2B Integrator fix pack 
							5020603_2 or 5020602_4 on Fix 
							Central

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References
Complete CVSS v3 Guide
On-line Calculator v3

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

15 June 2017: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- ---
Security Bulletin: Session management vulnerability affects IBM Sterling
B2B Integrator (CVE-2017-1152)

Document information

More support for: Sterling B2B Integrator

Software version: 5.2, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.2.6

Operating system(s): AIX, HP-UX, IBM i, Linux, Solaris, Windows

Reference #: 2004269

Modified date: 21 June 2017

Security Bulletin

Summary

IBM Sterling Global Integration On-Demand Environment does not properly
update the SESSIONID with each request, which could allow a user to obtain
the ID in further attacks against the system.

Vulnerability Details

CVEID: CVE-2017-1152
DESCRIPTION: IBM Sterling Global Integration On-Demand Environment does
not properly update the SESSIONID with each request, which could allow a
user to obtain the ID in further attacks against the system.
CVSS Base Score: 4.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/122293 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

IBM Sterling B2B Integrator 5.2

Remediation/Fixes

Product & Version			Remediation/Fix
IBM Sterling B2B Integrator 5.2		For B2B API users,
					1. Apply B2B Integrator fix pack 5020603_2 on Fix Central
					2. After 5.2.6.3_1 installation, find b2biAPIs_1000603_2.jar inside
					Media_IM_5020603_2.zip under "packages" folder. Use InstallService.sh(cmd)
					to install b2biAPIs_1000603_2.jar.

					For Health Check tool users,
					1. Download healthCheck_1000303_2.jar on  Fix Central
					2. Use InstallService.sh (cmd)to install it.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References
Complete CVSS v3 Guide
On-line Calculator v3

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

15 June 2017: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- ---
Security Bulletin: User permission vulnerability affects IBM Sterling B2B
Integrator (CVE-2017-1326)

Document information

More support for: Sterling B2B Integrator

Software version: 5.2, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.2.6

Operating system(s): AIX, HP-UX, IBM i, Linux, Solaris, Windows

Reference #: 2004274

Modified date: 21 June 2017

Security Bulletin

Summary

IBM Sterling File Gateway does not properly restrict user requests based
on permission level. This allows for users to update data related to other
users, by manipulating the parameters passed in the POST request.

Vulnerability Details

CVEID: CVE-2017-1326
DESCRIPTION: IBM Sterling File Gateway does not properly restrict user
requests based on permission level. This allows for users to update data
related to other users, by manipulating the parameters passed in the
POST request.
CVSS Base Score: 4.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/126060 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)

Affected Products and Versions

IBM Sterling B2B Integrator 5.2

Remediation/Fixes

Product & Version			APAR		Remediation/Fix
IBM Sterling B2B Integrator 5.2		IT20411		Apply B2B Integrator fix pack 
							5020603_2 on Fix Central

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References
Complete CVSS v3 Guide
On-line Calculator v3

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

18 June 2017: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- ---
Security Bulletin: Web page caching vulnerability affects IBM Sterling
B2B Integrator (CVE-2016-5893)

Document information

More support for: Sterling B2B Integrator

Software version: 5.2, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.2.6

Operating system(s): AIX, HP-UX, IBM i, Linux, Solaris, Windows

Reference #: 2004272

Modified date: 21 June 2017

Security Bulletin

Summary

IBM Sterling B2B Integrator Standard Edition allows web pages to be stored
locally which can be read by another user on the system.

Vulnerability Details

CVEID: CVE-2016-5893
DESCRIPTION: IBM Sterling B2B Integrator Standard Edition allows web pages
to be stored locally which can be read by another user on the system.
CVSS Base Score: 4
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/115336 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

IBM Sterling B2B Integrator 5.2

Remediation/Fixes

Product & Version			APAR		Remediation/Fix
IBM Sterling B2B Integrator 5.2		IT16223		Apply B2B Integrator fix pack 5020603_2 on Fix Central

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References
Complete CVSS v3 Guide
On-line Calculator v3

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

15 June 2017: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- ---
Security Bulletin: XML Entity Injection vulnerability affects IBM Sterling
B2B Integrator (CVE-2017-1192)

Document information

More support for: Sterling B2B Integrator

Software version: 5.2, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.2.6

Operating system(s): AIX, HP-UX, IBM i, Linux, Solaris, Windows

Reference #: 2004267

Modified date: 21 June 2017

Security Bulletin

Summary

IBM Sterling File Gateway is vulnerable to an XML External Entity Injection
(XXE) error when processing XML data. A remote attacker could exploit
this vulnerability to expose highly sensitive information or consume
memory resources.

Vulnerability Details

CVEID: CVE-2017-1192
DESCRIPTION: IBM Sterling File Gateway is vulnerable XML External Entity
Injection (XXE) error when processing XML data. A remote attacker could
exploit this vulnerability to expose highly sensitive information or
consume memory resources.
CVSS Base Score: 8.2
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/123663 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L)

Affected Products and Versions

IBM Sterling B2B Integrator 5.2

Remediation/Fixes

Product & Version			APAR		Remediation/Fix
IBM Sterling B2B Integrator 5.2		IT19755		Apply B2B Integrator fix pack 5020603_2
							or 5020602_4 on Fix Central

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References
Complete CVSS v3 Guide
On-line Calculator v3

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

15 June 2017: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Z+8/
-----END PGP SIGNATURE-----

« Back to bulletins