ESB-2018.2212.2 - UPDATE [Linux] IBM Platform Symphony and IBM Spectrum Symphony: Multiple vulnerabilities 2018-07-31

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2018.2212.2
Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM
                Platform Symphony and IBM Spectrum Symphony
                               31 July 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Platform Symphony
                   IBM Spectrum Symphony
Publisher:         IBM
Operating System:  Linux variants
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Modify Arbitrary Files          -- Remote/Unauthenticated      
                   Denial of Service               -- Remote/Unauthenticated      
                   Access Confidential Data        -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-2814 CVE-2018-2800 CVE-2018-2799
                   CVE-2018-2798 CVE-2018-2797 CVE-2018-2796
                   CVE-2018-2795 CVE-2018-2794 CVE-2018-2790
                   CVE-2018-2783  

Reference:         ASB-2018.0100
                   ASB-2018.0085
                   ESB-2018.2198
                   ESB-2018.2195
                   ESB-2018.2180
                   ESB-2018.2176

Original Bulletin: 
   https://www-01.ibm.com/support/docview.wss?uid=ibm10718381

Revision History:  July 31 2018: Fixed Original bulletin URL
                   July 31 2018: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM
Platform Symphony and IBM Spectrum Symphony

Document information
More support for: Platform Symphony
Software version: 6.1.1, 7.1.1, 7.1.2, 7.2.0.2, 7.1 Fix Pack 1

Operating system(s): Linux

Reference #: 0718381

Modified date: 30 July 2018

Security Bulletin


Summary

Multiple vulnerabilities exist in IBM(R) Runtime Environment Java(TM) versions,
specifically Version 6 Service Refresh 16 Fix Pack 60 and earlier releases used
by IBM Platform Symphony 6.1.1, Version 7 Service Refresh 10 Fix Pack 20 and
earlier releases used by IBM Platform Symphony 7.1 Fix Pack 1, Version 8
Service Refresh 5 Fix Pack 10 and earlier releases used by IBM Platform
Symphony 7.1.1 and IBM Spectrum Symphony 7.1.2 and 7.2.0.2. These issues were
disclosed as part of the IBM Java SDK updates in April 2018.

Vulnerability Details

If you run your own Java code using the IBM Java Runtime delivered with this
product, you should evaluate your code to determine whether the complete list
of vulnerabilities is applicable to your code. For a complete list of
vulnerabilities, refer to the link for "IBM Java SDK Security Bulletin" located
in the "References" section for more information.

CVEID:  CVE-2018-2814
DESCRIPTION:  An unspecified vulnerability related to the Java SE VM component
could allow an unauthenticated attacker to take control of the system.
CVSS Base Score: 8.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
141970  for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)

CVEID:  CVE-2018-2794
DESCRIPTION:  An unspecified vulnerability related to the Java SE Security
component could allow an unauthenticated attacker to take control of the
system.
CVSS Base Score: 7.7
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
141950  for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)

CVEID:  CVE-2018-2783
DESCRIPTION:  An unspecified vulnerability related to the Java SE Security
component could allow an unauthenticated attacker to cause high confidentiality
impact, high integrity impact, and no availability impact.
CVSS Base Score: 7.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
141939  for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)

CVEID:  CVE-2018-2799
DESCRIPTION:  An unspecified vulnerability related to the Java SE JAXP
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
141955  for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID:  CVE-2018-2798
DESCRIPTION:  An unspecified vulnerability related to the Java SE AWT component
could allow an unauthenticated attacker to cause a denial of service resulting
in a low availability impact using unknown attack vectors.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
141954  for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID:  CVE-2018-2797
DESCRIPTION:  An unspecified vulnerability related to the Java SE JMX component
could allow an unauthenticated attacker to cause a denial of service resulting
in a low availability impact using unknown attack vectors.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
141953  for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID:  CVE-2018-2796
DESCRIPTION:  An unspecified vulnerability related to the Java SE Concurrency
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
141952  for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID:  CVE-2018-2795
DESCRIPTION:  An unspecified vulnerability related to the Java SE Security
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
141951  for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID:  CVE-2018-2800
DESCRIPTION:  An unspecified vulnerability related to the Java SE RMI component
could allow an unauthenticated attacker to cause low confidentiality impact,
low integrity impact, and no availability impact.
CVSS Base Score: 4.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
141956  for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N)

CVEID:  CVE-2018-2790
DESCRIPTION:  An unspecified vulnerability related to the Java SE Security
component could allow an unauthenticated attacker to cause no confidentiality
impact, low integrity impact, and no availability impact.
CVSS Base Score: 3.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
141946  for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N)

Affected Products and Versions

IBM Platform Symphony 6.1.1
IBM Platform Symphony 7.1 Fix Pack 1
IBM Platform Symphony 7.1.1
IBM Spectrum Symphony 7.1.2
IBM Spectrum Symphony  7.2.0.2

Remediation/Fixes

Applicability

  o Operating systems: Linux x64

  o Cluster type: Single grid cluster

Prequisite

To install or uninstall the .rpm packages for IBM Spectrum Symphony 7.1.2 and
7.2.0.2, you must have root permission and RPM version 4.2.1 or later must be
installed on the host.

Before installation

 1. Log on to the master host as the cluster administrator.
 2. Disable your applications, stop services, and shut down the cluster:
    > source profile.platform
    > soamcontrol app disable all
    > egosh service stop all
    > egosh ego shutdown all
 3. For Platform Symphony 6.1.1, 7.1 Fix Pack 1, and 7.1.1, back up the JRE
    folder (under $EGO_TOP/jre/<EGO_version> /linux-x86_64/ ) on all hosts. For
    example, in a Platform Symphony 7.1.1 cluster, back up the JRE folder at
    $EGO_TOP/jre/3.3/linux-x86_64/ .
 4. For IBM Spectrum Symphony 7.1.2 and 7.2.0.2, uninstall the existing JRE.
     1. Query the existing JRE package and uninstall it from the dbpath
        location, for example:
        > rpm -qa --dbpath /tmp/rpm | grep egojre
        egojre-1.8.0.3-408454.x86_64
        > rpm -e egojre-1.8.0.3-408454.x86_64 --dbpath /tmp/rpm --nodeps
     2. For IBM Spectrum Symphony 7.2.0.2, remove the leftover link under the
        jre folder, for example:
        > rm -rf $EGO_TOP/jre/8.0.5.0

Install this interim fix

 1. Log on to each host as the cluster administrator and replace your current
    JRE folder with the files in this interim fix.
    For Platform Symphony 6.1.1, 7.1 Fix Pack 1 and 7.1.1, remove the files in
    the existing JRE folder and extract the interim package to the JRE folder
    on all hosts.
    For example, in a Platform Symphony 7.1.1 cluster, enter the following
    commands:
    > rm  -rf $EGO_TOP/jre/3.3/linux-x86_64/*
    > tar  zxfo   symSetup_jre8sr5fp17_linux-64_build497456.tar.gz -C $EGO_TOP/
    jre /3.3/linux-x86_64
    For IBM Spectrum Symphony 7.1.2 and 7.2.0.2, use the same dbpath and prefix
    as the installation, for example:
    > rpm -ivh --dbpath /tmp/rpm --prefix /opt/platform
    egojre-1.8.0.517.x86_64.rpm
 2. Delete all subdirectories and files in the GUI work directory:
    > rm - rf  $EGO_TOP/gui /work/*
    > rm -rf $EGO_TOP/gui/workarea/*
    NOTE: If you configured the WLP_OUTPUT_DIR parameter and
    APPEND_HOSTNAME_TO_WLP_OUTPUT_DIR is set to true in the $EGO_CONFDIR/conf/
    wlp.conf file, you must clean up the $WLP_OUTPUT_DIR/webgui_hostname /gui/
    workarea/ directory.
 3. Launch your browser and clear the browser cache.
 4. Log on to the master host as the cluster administrator, start the cluster,
    and enable your applications:
    > source profile.platform
    > egosh ego start all
    > soamcontrol app enable <appName >

Verify the installation

For Platform Symphony 6.1.1, the following example shows output for the java
- -version command:
> java -version
  java version "1.6.0"
  Java(TM) SE Runtime Environment (build pxa6460sr16fp65-20180505_01(SR16
FP65))
  IBM J9 VM (build 2.4, JRE 1.6.0 IBM J9 2.4 Linux amd64-64
jvmxa6460sr16fp65-20180411_383947 (JIT enabled, AOT enabled)
  J9VM - 20180411_383947
  JIT  - r9_20180411_383947
  GC   - GA24_Java6_SR16_20180411_1747_B383947)
  JCL  - 20180504_01

For Platform Symphony 7.1 Fix Pack 1, the following example shows output for
the java -version command:
> java -version
  java version "1.7.0"
  Java(TM) SE Runtime Environment (build pxa6470sr10fp25-20180430_01(SR10
FP25))
  IBM J9 VM (build 2.6, JRE 1.7.0 Linux amd64-64 Compressed References
20180420_384915 (JIT enabled, AOT enabled)
  J9VM - R26_Java726_SR10_20180420_1715_B384915
  JIT  - r11_20180420_384915
  GC   - R26_Java726_SR10_20180420_1715_B384915_CMPRSS
  J9CL - 20010803_384915)
  JCL - 20180427_01 based on Oracle jdk7u181-b09

For Platform Symphony 7.1.1, the following example shows output for the java
- -version command:
> java -version
  java version "1.8.0_171"
  Java(TM) SE Runtime Environment (build 8.0.5.17 - pxa6480sr5fp17-20180627_01
(SR5 FP17))
  IBM J9 VM (build 2.9, JRE 1.8.0 Linux amd64-64-Bit Compressed References
20180626_390413 (JIT enabled, AOT enabled)
  OpenJ9   - 5cdc604
  OMR      - a24bc01
  IBM      - 21870d6)
  JCL - 20180619_01 based on Oracle jdk8u171-b11

For IBM Spectrum Symphony 7.1.2, the following example shows output for the rpm
- -qa command:
> rpm -qa --dbpath /tmp/rpm |grep egojre
egojre-1.8.0.517-497456.x86_64

For IBM Spectrum Symphony 7.2.0.2, the following example shows output for the
rpm -qa command:
> rpm -qa --dbpath /tmp/rpm |grep egojre
egojre-8.0.5.17-497456.x86_64

Uninstallation

If required, follow these instructions to uninstall this interim fix in your
cluster:

 1. Log on to the master host as the cluster administrator.
 2. Disable your applications, stop services, and shut down the cluster:
    > source profile.platform
    > soamcontrol app disable all
    > egosh service stop all
    > egosh ego shutdown all
 3. Log on to all hosts as the cluster administrator and restore the JRE folder
    from your backup.
    For Platform Symphony 6.1.1, 7.1 Fix Pack 1 and 7.1.1, restore your backup
    to the $EGO_TOP/jre/<EGO_version> /linux-x86_64/ folder. For example, in a
    Platform Symphony 7.1.1 cluster, restore your backup to the $EGO_TOP/jre/
    3.3/linux-x86_64/ folder.

    For IBM Spectrum Symphony 7.1.2 and 7.2.0.2, uninstall the existing JRE,
    then install the old one:
     1. Uninstall the JRE fix, for example:
        > rpm -e egojre-1.8.0.517-497456.x86_64 --dbpath /tmp/rpm/ --nodeps
     2. For IBM Spectrum Symphony 7.2.0.2, remove the leftover link under the
        jre folder, for example:
        > rm -rf $EGO_TOP/jre/8.0.5.17
     3. Extract the egojre .rpm package from the .bin installation package, for
        example, for IBM Spectrum Symphony 7.1.2:
        > sym-7.1.2.0_x86_64.bin --extract /opt/extract
     4. Reinstall the old JRE package. Use the same dbpath and prefix as the
        installation, for example:
        > rpm -ivh --dbpath /tmp/rpm --prefix /opt/extract/
        egojre-1.8.0.3.x86_64.rpm
 4. Delete all subdirectories and files in the GUI work directory:
    > rm -rf $EGO_TOP/gui/work/*
    > rm -rf $EGO_TOP/gui/workarea/*
    NOTE: If you configured the WLP_OUTPUT_DIR parameter and
    APPEND_HOSTNAME_TO_WLP_OUTPUT_DIR is set to true in the $EGO_CONFDIR/conf/
    wlp.conf file, you must clean up the $WLP_OUTPUT_DIR/webgui_hostname /gui/
    workarea/ directory.
 5. Launch your browser and clear the browser cache.
 6. Log on to the master host as the cluster administrator, start the cluster,
    and enable your applications:
    > source profile.platform
    > egosh ego start all
    > soamcontrol app enable <appName >

Packages

+--------+-------+-------+----------------------------------------------------+
|Product |VRMF   |APAR   |Remediation/First Fix                               |
+--------+-------+-------+----------------------------------------------------+
|        |       |       |symSetup_jre6sr16fp65_linux-64_build497456.tar.gz   |
|        |       |       |                                                    |
|IBM     |       |       |http://www.ibm.com/support/fixcentral/swg/          |
|Platform|6.1.1  |P102655|selectFixes-product=ibm/Other+software/             |
|Symphony|       |       |Platform+Symphony&release=All&platform=All&function=|
|        |       |       |fixId&fixids=sym-6.1.1-build497456&includeSupersedes|
|        |       |       |=0                                                  |
+--------+-------+-------+----------------------------------------------------+
|        |       |       |symSetup_jre7sr10fp25_linux-64_build497456.tar.gz   |
|IBM     |       |       |                                                    |
|Platform|7.1 Fix|P102655|http://www.ibm.com/support/fixcentral/swg/          |
|Symphony|Pack 1 |       |selectFixes-product=ibm/Other+software/             |
|        |       |       |Platform+Symphony&release=All&platform=All&function=|
|        |       |       |fixId&fixids=sym-7.1-build497456&includeSupersedes=0|
+--------+-------+-------+----------------------------------------------------+
|        |       |       |symSetup_jre8sr5fp17_linux-64_build497456.tar.gz    |
|        |       |       |                                                    |
|IBM     |       |       |http://www.ibm.com/support/fixcentral/swg/          |
|Platform|7.1.1  |P102655|selectFixes-product=ibm/Other+software/             |
|Symphony|       |       |Platform+Symphony&release=All&platform=All&function=|
|        |       |       |fixId&fixids=sym-7.1.1-build497456&includeSupersedes|
|        |       |       |=0                                                  |
+--------+-------+-------+----------------------------------------------------+
|        |       |       |egojre-1.8.0.517.x86_64.rpm                         |
|        |       |       |                                                    |
|IBM     |       |       |http://www.ibm.com/support/fixcentral/swg/          |
|Spectrum|7.1.2  |P102655|selectFixes-product=ibm/Other+software/             |
|Symphony|       |       |IBM+Spectrum+Symphony&release=All&platform=All&     |
|        |       |       |function=fixId&fixids=sym-7.1.2-build497456&        |
|        |       |       |includeSupersedes=0                                 |
+--------+-------+-------+----------------------------------------------------+
|        |       |       |egojre-8.0.5.17.x86_64.rpm                          |
|        |       |       |                                                    |
|IBM     |       |       |http://www.ibm.com/support/fixcentral/swg/          |
|Spectrum|7.2.0.2|P102655|selectFixes-product=ibm/Other+software/             |
|Symphony|       |       |IBM+Spectrum+Symphony&release=All&platform=All&     |
|        |       |       |function=fixId&fixids=sym-7.2.0.2-build497456&      |
|        |       |       |includeSupersedes=0                                 |
+--------+-------+-------+----------------------------------------------------+

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

Reference

Complete CVSS v3 Guide
On-line Calculator v3

IBM Java SDK Security Bulletin

Related Information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowlegement

None

Change History

22 July 2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=0+G7
-----END PGP SIGNATURE-----

« Back to bulletins