ESB-2018.0611 - [Win][UNIX/Linux] IBM Campaign & Contact Optimization: Multiple vulnerabilities 2018-03-02

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.0611
          Security update for IBM Campaign & Contact Optimization
                               2 March 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Campaign
                   IBM Contact Optimization
Publisher:         IBM
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Access Privileged Data -- Remote/Unauthenticated
                   Denial of Service      -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-8610 CVE-2016-7052 CVE-2016-6309
                   CVE-2016-6306 CVE-2016-6304 CVE-2016-6303
                   CVE-2016-6302 CVE-2016-2183 CVE-2016-2182
                   CVE-2016-2181 CVE-2016-2180 CVE-2016-2179
                   CVE-2016-2178 CVE-2016-2177 

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=swg22014126
   http://www.ibm.com/support/docview.wss?uid=swg22014169

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Multiple Vulnerabilities in OpenSSL affect IBM Campaign, IBM
Contact Optimization

Document information

Software version: 9.0, 9.1, 9.1.1, 9.1.2
Operating system(s): AIX, Linux, Solaris, Windows
Software edition: Enterprise
Reference #: 2014126
Modified date: 01 March 2018

Summary

Multiple OpenSSL vulnerabilities in IBM Campaign and IBM Contact Optimization
can result in denial of service attack.

Vulnerability Details

CVEID: CVE-2016-6303
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by an integer
overflow in the MDC2_Update function. By using unknown attack vectors, a remote
attacker could exploit this vulnerability to trigger an out-of-bounds write and
cause the application to crash.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
117023 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2016-6302
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by the
failure to consider the HMAC size during validation of the ticket length by the
tls_decrypt_ticket function A remote attacker could exploit this vulnerability
using a ticket that is too short to cause a denial of service.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
117024 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2016-6304
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by multiple
memory leaks in t1_lib.c during session renegotiation. By sending an overly
large OCSP Status Request extension, a remote attacker could exploit this
vulnerability to consume all available memory resources.
CVSS Base Score: 7.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
117110 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2016-2180
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by an
out-of-bounds read in the TS_OBJ_print_bio function. A remote attacker could
exploit this vulnerability using a specially crafted time-stamp file to cause
the application to crash.
CVSS Base Score: 7.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
115829 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2016-2177
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by the
incorrect use of pointer arithmetic for heap-buffer boundary checks. By
leveraging unexpected malloc behavior, a remote attacker could exploit this
vulnerability to trigger an integer overflow and cause the application to
crash.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
113890 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2016-2178
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by an error in the DSA implementation that allows the
following of a non-constant time codepath for certain operations. An attacker
could exploit this vulnerability using a cache-timing attack to recover the
private DSA key.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
113889 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2016-2179
DESCRIPTION: OpenSSL is vulnerable to a denial of service. By sending specially
crafted DTLS record fragments to fill up buffer queues, a remote attacker could
exploit this vulnerability to open a large number of simultaneous connections
and consume all available memory resources.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
116343 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2016-6306
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by missing
message length checks when parsing certificates. A remote authenticated
attacker could exploit this vulnerability to trigger an out-of-bounds read and
cause a denial of service.
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
117112 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2016-2181
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by an error
in the DTLS replay protection implementation. By sending a specially crafted
sequence number, a remote attacker could exploit this vulnerability to cause
valid packets to be dropped.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
116344 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2016-2183
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by an error in the DES/3DES cipher, used as a part of the
SSL/TLS protocol. By capturing large amounts of encrypted traffic between the
SSL/TLS server and the client, a remote attacker able to conduct a
man-in-the-middle attack could exploit this vulnerability to recover the
plaintext data and obtain sensitive information. This vulnerability is known as
the SWEET32 Birthday attack.
CVSS Base Score: 3.7
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
116337 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2016-6309
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by a
use-after-free when handling message sizes. By sending an overly large message,
a remote attacker could exploit this vulnerability to possibly execute
arbitrary code on the system or cause the application to crash.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
117148 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2016-2182
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by an
out-of-bounds write in the TS_OBJ_print_bio function in crypto/bn/bn_print.c. A
remote attacker could exploit this vulnerability using a specially crafted
value to cause the application to crash.
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
116342 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)

CVEID: CVE-2016-7052
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by a missing
CRL sanity check. By attempting to use CRLs, a remote attacker could exploit
this vulnerability to cause the application to crash.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
117149 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

Affected Products and Versions

IBM Contact Optimization 9.0, 9.1, 9.1.1, 9.1.2

IBM Campaign 9.0, 9.1, 9.1.1, 9.1.2

Remediation/Fixes

+------------------------------------------------------------------------------------------+
|Product                    |VRMF      |Remediation/Fix                                    |
|---------------------------+----------+---------------------------------------------------|
|                           |          |https://www-945.ibm.com/support/fixcentral/swg/    |
|                           |          |selectFixes?parent=                                |
|                           |          |Enterprise%20Marketing%20Management&product=ibm/   |
|                           |          |Other+software/Unica+Optimize&release=9.1.0.12&    |
|IBM Contact Optimization   |9.1.0.12  |platform=All&function=all                          |
|---------------------------+----------+---------------------------------------------------|
|                           |          |https://www-945.ibm.com/support/fixcentral/swg/    |
|                           |          |selectFixes?parent=                                |
|                           |          |Enterprise%20Marketing%20Management&product=ibm/   |
|                           |          |Other+software/Unica+Optimize&release=9.1.2.5&     |
|IBM Contact Optimization   |9.1.2.5   |platform=All&function=all                          |
|---------------------------+----------+---------------------------------------------------|
|IBM Campaign               |9.1.0.12  |https://www-945.ibm.com/support/fixcentral/swg/    |
|                           |          |selectFixes?parent=                                |
|                           |          |Enterprise%20Marketing%20Management&product=ibm/   |
|                           |          |Other+software/Unica+Campaign&release=9.1.0.12&    |
|                           |          |platform=All&function=all                          |
|---------------------------+----------+---------------------------------------------------|
|IBM Campaign               |9.1.2.5   |https://www-945.ibm.com/support/fixcentral/swg/    |
|                           |          |selectFixes?parent=                                |
|                           |          |Enterprise%20Marketing%20Management&product=ibm/   |
|                           |          |Other+software/Unica+Campaign&release=9.1.2.5&     |
|                           |          |platform=All&function=all                          |
+------------------------------------------------------------------------------------------+

Workarounds and Mitigations

No fixpacks will be released for 9.0 and 9.1.1. As per the support policy,
customers need to upgrade to 9.1 or 9.1.2 as applicable.

For more information please reach out to IBM Technical Support.

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF
ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY
ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- -------------------------------------------------------------------------------

Security Bulletin: Open Source OpenSSL, GNUTls, RHEL 'SSL-Death-Alert' Affect
IBM Campaign and IBM Contact Optimization (CVE-2016-8610)

Document information

Software version: 9.0, 9.1, 9.1.1, 9.1.2
Operating system(s): AIX, Linux, Solaris, Windows
Software edition: Enterprise
Reference #: 2014169
Modified date: 01 March 2018

Summary

Open Source OpenSSL, GNUTls, RHEL 'SSL-Death-Alert' affect IBM Campaign and IBM
Contact Optimization - CVE-2016-8610

Vulnerability Details

CVEID: CVE-2016-8610
DESCRIPTION: SSL/TLS protocol is vulnerable to a denial of service, caused by
an error when processing ALERT packets during a SSL handshake. By sending
specially-crafted packets, a remote attacker could exploit this vulnerability
to cause the application to stop responding.
CVSS Base Score: 7.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
118296 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

IBM Campaign 9.0, 9.1, 9.1.1, 9.1.2

IBM Contact Optimization 9.0, 9.1, 9.1.1, 9.1.2

Remediation/Fixes

+------------------------------------------------------------------------------------------+
|Product                    |VRMF      |Remediation/Fix                                    |
|---------------------------+----------+---------------------------------------------------|
|                           |          |https://www-945.ibm.com/support/fixcentral/swg/    |
|                           |          |selectFixes?parent=                                |
|                           |          |Enterprise%20Marketing%20Management&product=ibm/   |
|                           |          |Other+software/Unica+Optimize&release=9.1.0.12&    |
|IBM Contact Optimization   |9.1.0.12  |platform=All&function=all                          |
|---------------------------+----------+---------------------------------------------------|
|                           |          |https://www-945.ibm.com/support/fixcentral/swg/    |
|                           |          |selectFixes?parent=                                |
|                           |          |Enterprise%20Marketing%20Management&product=ibm/   |
|                           |          |Other+software/Unica+Optimize&release=9.1.2.5&     |
|IBM Contact Optimization   |9.1.2.5   |platform=All&function=all                          |
|---------------------------+----------+---------------------------------------------------|
|IBM Campaign               |9.1.0.12  |https://www-945.ibm.com/support/fixcentral/swg/    |
|                           |          |selectFixes?parent=                                |
|                           |          |Enterprise%20Marketing%20Management&product=ibm/   |
|                           |          |Other+software/Unica+Campaign&release=9.1.0.12&    |
|                           |          |platform=All&function=all                          |
|---------------------------+----------+---------------------------------------------------|
|IBM Campaign               |9.1.2.5   |https://www-945.ibm.com/support/fixcentral/swg/    |
|                           |          |selectFixes?parent=                                |
|                           |          |Enterprise%20Marketing%20Management&product=ibm/   |
|                           |          |Other+software/Unica+Campaign&release=9.1.2.5&     |
|                           |          |platform=All&function=all                          |
+------------------------------------------------------------------------------------------+

Workarounds and Mitigations

No fixpacks will be released for 9.0 and 9.1.1. As per the support policy,
customers need to upgrade to 9.1 or 9.1.2 as applicable.

For more information please reach out to IBM Technical Support at https://
www.ibm.com/support/home/

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF
ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY
ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=7zzA
-----END PGP SIGNATURE-----

« Back to bulletins