ESB-2018.1754 - [Win][Linux][IBM i][HP-UX][Solaris][AIX] IBM MQ: Multiple vulnerabilities 2018-06-13

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.1754
        Security Bulletin: IBM MQ and WebSphere MQ are affected by
              multiple vulnerabilities in OpenSSL and GSKit.
                               13 June 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM MQ
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   Solaris
                   IBM i
                   Linux variants
                   Windows
Impact/Access:     Access Privileged Data -- Remote/Unauthenticated
                   Denial of Service      -- Remote/Unauthenticated
                   Reduced Security       -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-1447 CVE-2018-1428 CVE-2018-1427
                   CVE-2018-1426 CVE-2017-3736 CVE-2017-3732
                   CVE-2016-0705  

Reference:         ASB-2018.0093
                   ASB-2018.0092
                   ESB-2016.0547
                   ESB-2016.0544
                   ESB-2016.0543.2

Original Bulletin: 
   https://www-01.ibm.com/support/docview.wss?uid=swg22014651

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: IBM MQ and WebSphere MQ are affected by multiple
vulnerabilities in OpenSSL and GSKit.

More support for: IBM MQ
SSL

Software version: 7.0.1, 7.0.1.1, 7.0.1.2, 7.0.1.3, 7.0.1.4, 7.0.1.5, 7.0.1.6,
7.0.1.7, 7.0.1.8, 7.0.1.9, 7.0.1.10, 7.0.1.11, 7.0.1.12, 7.0.1.13, 7.0.1.14,
7.1, 7.1.0.1, 7.1.0.2, 7.1.0.3, 7.1.0.4, 7.1.0.5, 7.1.0.6, 7.1.0.7, 7.5,
7.5.0.1, 7.5.0.2, 7.5.0.3, 7.5.0.4, 7.5.0.5, 7.5.0.6, 7.5.0.7, 7.5.0.8, 8.0,
8.0.0.1, 8.0.0.2, 8.0.0.3, 8.0.0.4, 8.0.0.5, 8.0.0.6, 8.0.0.7, 8.0.0.8, 9.0,
9.0.0.1, 9.0.0.2, 9.0.1, 9.0.2, 9.0.3, 9.0.4

Operating system(s): AIX, HP-UX, IBM i, Linux, Solaris, Windows

Software edition: All Editions

Reference #: 2014651

Modified date: 12 June 2018

Security Bulletin

Summary

IBM MQ and WebSphere MQ have addressed multiple vulnerabilities in OpenSSL and
GSKit.

OpenSSL is used by IBM MQ Advanced Message Security on the IBM i platform only.

Vulnerability Details

CVEID: CVE-2016-0705
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by a
double-free error when parsing DSA private keys. An attacker could exploit this
vulnerability to corrupt memory and cause a denial of service.
CVSS Base Score: 3.7
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/111140 for the current
score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2017-3732
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by a carry propagating bug in the x86_64 Montgomery
squaring procedure. An attacker could exploit this vulnerability to obtain
information about the private key.
CVSS Base Score: 5.3
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/121313 for the current
score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2017-3736
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by a carry propagation flaw in the x86_64 Montgomery
squaring function bn_sqrx8x_internal(). An attacker with online access to an
unpatched system could exploit this vulnerability to obtain information about
the private key.
CVSS Base Score: 5.9
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/134397 for the current
score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID: CVE-2018-1428
DESCRIPTION: IBM GSKit uses weaker than expected cryptographic algorithms that
could allow an attacker to decrypt highly sensitive information.
CVSS Base Score: 6.2
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/139073 for the current
score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID: CVE-2018-1427
DESCRIPTION: IBM GSKit contains several enviornment variables that a local
attacker could overflow and cause a denial of service.
CVSS Base Score: 6.2
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/139072 for the current
score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2018-1426
DESCRIPTION: IBM GSKit duplicates the PRNG state across fork() system calls
when multiple ICC instances are loaded which could result in duplicate Session
IDs and a risk of duplicate key material.
CVSS Base Score: 7.4
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/139071 for the current
score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)

CVEID: CVE-2018-1447
DESCRIPTION: The GSKit CMS KDB logic fails to salt the hash function resulting
in weaker than expected protection of passwords. A weak password may be
recovered. Note: After update the customer should change password to ensure the
new password is stored more securely. Products should encourage customers to
take this step as a high priority action.
CVSS Base Score: 5.1
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/139972 for the current
score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

WebSphere MQ v7.0.1

  o Maintenance levels: 7.0.1.0 - 7.0.1.14


WebSphere MQ v7.1

  o Maintenance levels: 7.1.0.0 - 7.1.0.9


WebSphere MQ v7.5

  o Maintenance levels: 7.5.0.0 - 7.5.0.8


IBM MQ v8.0 and IBM MQ Appliance v8.0

  o Maintenance level: 8.0.0.0 - 8.0.0.8


IBM MQ v9.0 LTS

  o Maintenance levels: 9.0.0.0 - 9.0.0.2


IBM MQ v9.0.x CD and IBM MQ Appliance v9.0.x CD

  o IBM MQ version 9.0.1 - 9.0.4

Remediation/Fixes


WebSphere MQ v7.0.1

  o Contact WebSphere MQ Support requesting an iFix for APAR IT25200


WebSphere MQ v7.1

  o Contact WebSphere MQ Support requesting an iFix for APAR IT25200


WebSphere MQ v7.5

  o Apply iFix IT25200


IBM MQ v8.0 and IBM MQ Appliance v8.0

  o Apply fixpack 8.0.0.9


IBM MQ v9.0 LTS

  o Apply fixpack 9.0.0.3


IBM MQ v9.0.x CD and IBM MQ Appliance v9.0.x CD

  o Upgrade to IBM MQ 9.0.5

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References

Complete CVSS v3 Guide
On-line Calculator v3

Related information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

12 June 2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF
ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY
ACTUAL OR POTENTIAL SECURITY VULNERABILITY.


                          Cross reference information

  Segment     Product            Component    Platform    Version     Edition

 Business     IBM MQ
Integration

 Business     IBM MQ Advanced
Integration

 Business     IBM MQ Advanced for
Integration   Developers

 Business     IBM MQ Appliance
Integration

 Business     WebSphere MQ
Integration

 Business     WebSphere MQ Advanced for
Integration   Developers

 Business     IBM MQ Advanced Message
Integration   Security

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBWyCSomaOgq3Tt24GAQjC7xAA3kdiq5iFf7eSmNgqZ6pyFkohiSFOrhM9
dK1HvXUczKWYi74Ujj6mKAAGBD8L31JJqIN5gHc0M/z2aquq4DoUPUBnroYuK4Rb
avqGe/9Z8GMKkheGFHmYEF5tOVaaqMgWa6EA7Nfw4atqf3Y+CZ0iaYUi+GF11InW
vv9wXxGHqbEbu5Ix43Sizn8DzPV8TiU081gVJ+TGmGOv/j0RQwJm9po6v440zLP+
alH+Lmj8tT6BPZv8vhhwdJO4mGByIt300QwRDDJCoRqi/GGm41+zr57lyz9vyaSl
fJI0JWDWTNfMql2kjwiLavEgAM/TsQrj3Wz37Bt8+xi5h6JdI5Rs0iZss5ySeala
loOVILRYic7aWeg61bLmC9PZmDhF3BH2lYr8e0WIAg3jMLqQPj8JnUQLXP+XtJmy
WzAosS7IaIqacqA13df12299hlb8oXsU7VchSE6KwFeNUQ7n9Al1G1v9mZenRwuj
851+qOaNc2+eAFDhZQTwv7zJJe59s4Ju+Ou5YW0hPfNhdboVCxwrJGcmuYeM4S3k
DL+vBSiTpxcYwJ+OnFQz+RlVih4yHb7tSXYIq94rZr9hGQqQeegNlyISD47tnsrm
RwYDkNTdFrr/wWlvU5yk0WJ5J4gYnb2lB3u6KMVDvI+tx+u81fU24d4rN11DNNFP
vgwC5ymZ4Zg=
=toeT
-----END PGP SIGNATURE-----

« Back to bulletins