ESB-2017.2479 - [Win][Linux][HP-UX][Solaris][AIX] IBM WebSphere Message Broker and IBM Integration Bus: Access confidential data - Remote/unauthenticated 2017-10-03

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.2479
  Security Bulletin: WebSphere Message Broker and IBM Integration Bus are
     affected by information disclosure vulnerability (CVE-2017-1126)
                              3 October 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM WebSphere Message Broker
                   IBM Integration Bus
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   Linux variants
                   Solaris
                   Windows
Impact/Access:     Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-1126  

Reference:         ESB-2017.1978

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=swg22008470

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: WebSphere Message Broker and IBM Integration Bus are
affected by information disclosure vulnerability (CVE-2017-1126)

Security Bulletin

Document information

More support for:
IBM Integration Bus

Software version:
9.0, 10.0

Operating system(s):
AIX, HP-UX, Linux, Solaris, Windows

Reference #:   2008470

Modified date: 02 October 2017

Summary

IBM Integration Bus and WebSphere Message Broker have addressed the
vulnerability that would allow an unauthorized user to obtain sensitive
information about software versions, and which could lead to further attacks.

Vulnerability Details

CVEID: CVE-2017-1126
DESCRIPTION:
IBM Integration Bus and WebSphere Message Broker could allow an unauthorized
user to obtain sensitive information about software versions, which could
lead to further attacks.
CVSS Base Score: 5.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/121341
for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

IBM Integration Bus V9.0.0.0 - V9.0.0.8 and V10.0.0.0 - V10.0.0.9
WebSphere Message Broker V8.0.0.0 - V8.0.0.8

Remediation/Fixes

Product                   VRMF                 APAR      Remediation/Fix
IBM Integration Bus       V10.0.0.0-V10.0.0.9  IT18731/  The APARs are available in fix pack 10.0.0.10
                                               IT21161   http://www-01.ibm.com/support/docview.wss?uid=swg24043943

IBM Integration Bus       V9.0.0.0-V9.0.0.8    IT18731/  The APARs are available in fix pack 9.0.0.9
                                               IT21161   http://www-01.ibm.com/support/docview.wss?uid=swg24043947

WebSphere Message Broker  V8.0.0.0 -V8.0.0.8   IT18731/  APAR IT18731 is available in fix pack 8.0.0.9 
                                               IT21161   http://www-01.ibm.com/support/docview.wss?uid=swg24043806
                                                         For a fix for APAR IT21161, please contact IBM support.

Websphere Message Broker V8 is no longer in full support; IBM recommends 
upgrading to a fixed, supported version/release/platform of the product. If 
you are an extended support customer and require a fix, this is available 
only for the latest fixpack (8.0.0.9). To obtain the fix contact IBM support. 

Workarounds and Mitigations

None

References

Complete CVSS v3 Guide
On-line Calculator v3

Related information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

29 September 2017: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Cross reference information 

Segment               Product                   Component    Platform                               Version  Edition
Business Integration  WebSphere Message Broker               AIX, HP-UX, Linux, Solaris, Windows    8

Product Alias/Synonym

WMB IIB

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBWdMgZ4x+lLeg9Ub1AQhbKg/+OHDCOnB57U5Ua61hUsqaVFwIDzuxrV+3
I5OGE6jFkP7u1pGeI1bncqmnANVuJlCykoCqNWtJ5wuqWbQQYt/xjYhr5ZpUppyy
zzby13oTYaIJBhoiwo/R74yQHbnKw1mBwajWnrxlQ0ceCYOMDbD0eBVhWdQcm6MF
SyXVFJ5vmxBqLsYJiAJFZkjVK648/d4gXuQtc0elp3F/9FzIRwenkGfcWmpt2ITN
8EtkFHCdHIAcXfX2aFcMGMZ8KiTVqV7NkUesTYhllWVhuFtPXjlJRU8ZVndiKZvH
VXU6gwKi6M7CcJpki3yMn/1Mc10O3fiU8x+vu2xgV3dyKapb55wEGkvBFBq7utLW
HOKnp957Is+Ot0D1AeljJjOuHf2ssREbnGHlzIMjLnEhZQ7xwJDmPyGxZuN3OQRJ
10pzMwndkmda8ZpgD59DpKU4hJFjRItmzb5QKx2kuR/8rYe6+SKJsTldPT2m2apO
dweXroIi2iReFjraf1M8baJDyi5/PRJ5ZSA4wFlvplq57Hm8yFnIWQuCThx7TSs3
k575sonuttEZER/ha4sf9VCHphrqunuWuGvBHyWjuwk/oAPLXI5s2NfeulIgb81I
H0d0rmUJ2M3XgG+QVcqgyx1TrH9aX80YQ4fjUuF7QKQzpeXB9B8733XhYYpyofKx
9KigE3O8jT4=
=s8PJ
-----END PGP SIGNATURE-----

« Back to bulletins