ESB-2017.3221 - [Linux] IBM IIB and WSMB Hypervisor Editions: Multiple vulnerabilities 2017-12-18

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.3221
      IBM advises to update Red Hat Enterprise Linux in IBM products
                             18 December 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Integration Bus Hypervisor Edition
                   IBM WebSphere Message Broker Hypervisor Edition
Publisher:         IBM
Operating System:  Linux variants
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Access Privileged Data          -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Provide Misleading Information  -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-15275 CVE-2017-15087 CVE-2017-15086
                   CVE-2017-15085 CVE-2017-14746 

Reference:         ESB-2017.2802
                   ESB-2017.3199

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=swg22011696

- --------------------------BEGIN INCLUDED TEXT--------------------

Action required for IBM Integration Bus Hypervisor Edition V9.0 and WebSphere
Message Broker Hypervisor Edition V8.0 for security vulnerabilities in Red Hat
Linux

IIB WMB

Document information

More support for: IBM Integration Bus Hypervisor Edition

Software version: 9.0

Operating system(s): Linux

Reference #: 2011696

Modified date: 15 December 2017

Flash (Alert)

Abstract

IBM Integration Bus Hypervisor Edition V9.0 and WebSphere Message Broker
Hypervisor Edition V8.0 require customer action for security vulnerabilities in
Red Hat Linux

Content

IBM Integration Bus Hypervisor Edition V9.0 and WebSphere Message Broker
Hypervisor Edition V8.0 ship with versions of Red Hat Enterprise Linux (RHEL)
Server that are vulnerable to
CVE-2017-14746 CVE-2017-15085 CVE-2017-15086 CVE-2017-15087 CVE-2017-15275

IBM Integration Bus Hypervisor Edition V9.0 and WebSphere Message Broker
Hypervisor Edition V8.0 ship with Red Hat Enterprise Linux (RHEL) Server 6.2

Remediation:

IBM strongly recommends that you contact Red Hat to obtain and install fixes
for Red Hat Enterprise Linux (RHEL) Server 6.2, as applicable.


                          Cross reference information
   Segment                Product            Component Platform Version Edition
   Business    WebSphere Message Broker                Linux    8.0
 Integration   Hypervisor Edition

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=NHjE
-----END PGP SIGNATURE-----

« Back to bulletins