ESB-2018.2977 - [Win][UNIX/Linux] IBM Financial Transaction Manager: Multiple vulnerabilities 2018-10-04

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.2977
           Multiple vulnerabilities have been identified in IBM
                  Financial Transaction Manager products
                              4 October 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Financial Transaction Manager
Publisher:         IBM
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                   Access Privileged Data          -- Remote/Unauthenticated      
                   Create Arbitrary Files          -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-12539 CVE-2018-1819 CVE-2018-1670
                   CVE-2018-1656 CVE-2018-1517 CVE-2017-3736
                   CVE-2017-3732  

Reference:         ASB-2018.0170
                   ASB-2018.0093
                   ASB-2018.0092
                   ESB-2017.0488.3
                   ESB-2017.0386.2
                   ESB-2017.0317

Original Bulletin: 
   https://www.ibm.com/support/docview.wss?uid=ibm10732361
   https://www.ibm.com/support/docview.wss?uid=ibm10731547
   https://www.ibm.com/support/docview.wss?uid=ibm10732367
   https://www.ibm.com/support/docview.wss?uid=ibm10731549
   https://www.ibm.com/support/docview.wss?uid=ibm10732357
   https://www.ibm.com/support/docview.wss?uid=ibm10731325
   https://www.ibm.com/support/docview.wss?uid=ibm10731323
   https://www.ibm.com/support/docview.wss?uid=ibm10731337
   https://www.ibm.com/support/docview.wss?uid=ibm10731331

Comment: This bulletin contains nine (9) IBM security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Financial Transaction Manager for ACH Services for
Multi-Platform is affected by a potential SQL Injection vulnerability
CVE-2018-1819

Security Bulletin

Document information

More support for: Financial Transaction Manager

Software version: 3.0.6

Operating system(s): Platform Independent

Reference #: 0732361

Modified date: 02 October 2018

Summary

Financial Transaction Manager for ACH Services for Multi-Platform (FTM ACH) has
addressed the following vulnerability: Potential SQL Injection CVE-2018-1819

Vulnerability Details

CVEID: CVE-2018-1819
DESCRIPTION: IBM Financial Transaction Manager for Digital Payments for
Multi-Platform is vulnerable to SQL injection. A remote attacker could send
specially-crafted SQL statements, which could allow the attacker to view, add,
modify or delete information in the back-end database.
CVSS Base Score: 6.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
150023 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)

Affected Products and Versions

FTM ACH v3.0.6.0 - 3.0.6.2

Remediation/Fixes

+-------+-------------+-------+-----------------------+
|Product|    VRMF     | APAR  | Remediation/First Fix |
+-------+-------------+-------+-----------------------+
|FTM ACH|3.0.6-3.0.6.2|PH03029|3.0.6-FTM-ACH-MP-fp0003|
+-------+-------------+-------+-----------------------+

Workarounds and Mitigations

If you are not using the SOAP Web Services then remove the WebServices.ear from
your WebSphere Application Server instances.

Acknowledgement

None

Change History

2 October 2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Product Alias/Synonym

FTM
FTM ACH

- --------------------------------------------------------------------------------

Security Bulletin: Financial Transaction Manager for Check Services:
Information Leakage in configuration listing (CVE-2018-1670)

Security Bulletin

Document information

More support for: Financial Transaction Manager

Software version: 3.0.2

Operating system(s): Platform Independent

Reference #: 0731547

Modified date: 02 October 2018

Summary

IBM Financial Transaction Manager for Check Services (FTM CHK) for
Multi-Platform could allow an authenticated user to obtain sensitive product
configuration information from log files.

Vulnerability Details

CVEID: CVE-2018-1670
DESCRIPTION: IBM Financial Transaction Manager for ACH Services for
Multi-Platform could allow an authenticated user to obtain sensitive product
configuration information from log files.
CVSS Base Score: 3.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
144946 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

FTM CHK v3.0.2.0 - 3.0.2.1,

Remediation/Fixes

Product    VRMF      APAR          Remediation/First Fix

           3.0.2.0 -
FTM CHK    3.0.2.1   PH02829       3.0.2.1-FTM-Check-MP-iFix0015

Workarounds and Mitigations

None

Change History

2 October 2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Product Alias/Synonym

FTM
FTM CHK
FTM Check



- --------------------------------------------------------------------------------

Security Bulletin: Financial Transaction Manager for Corporate Payment Services
for Multi-Platform is affected by a potential SQL Injection vulnerability
CVE-2018-1819

Security Bulletin

Document information

More support for: Financial Transaction Manager

Software version: 3.0.2, 3.0.4

Operating system(s): Platform Independent

Reference #: 0732367

Modified date: 02 October 2018

Summary

Financial Transaction Manager for Corporate Payment Services for Multi-Platform
(FTM CPS) has addressed the following vulnerability: Potential SQL Injection
CVE-2018-1819

Vulnerability Details

CVEID: CVE-2018-1819
DESCRIPTION: IBM Financial Transaction Manager for Digital Payments for
Multi-Platform is vulnerable to SQL injection. A remote attacker could send
specially-crafted SQL statements, which could allow the attacker to view, add,
modify or delete information in the back-end database.
CVSS Base Score: 6.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
150023 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)

Affected Products and Versions

FTM CPS v3.0.2.0 - 3.0.2.1, v3.0.4.0

Remediation/Fixes

+-------+------------+-------+------------------------------------------------+
|Product|    VRMF    | APAR  |             Remediation/First Fix              |
+-------+------------+-------+------------------------------------------------+
|FTM CPS|3.0.2.0 -   |PH03030|A link to the fix will be added here before the |
|       |3.0.2.1     |       |bulletin is published                           |
+-------+------------+-------+------------------------------------------------+
|FTM CPS|3.0.4.0     |PH03030|A link to the fix will be added here before the |
|       |            |       |bulletin is published                           |
+-------+------------+-------+------------------------------------------------+

Workarounds and Mitigations

If you are not using the SOAP Web Services then remove the WebServices.ear from
your WebSphere Application Server instances.

Acknowledgement

None

Change History

9 March 2019: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Product Alias/Synonym

FTM
FTM CPS

- --------------------------------------------------------------------------------

Security Bulletin: Financial Transaction Manager for Corporate Payment
Services: Information Leakage in configuration listing (CVE-2018-1670)

Security Bulletin

Document information

More support for: Financial Transaction Manager

Software version: 3.0.2

Operating system(s): Platform Independent

Reference #: 0731549

Modified date: 02 October 2018

Summary

IBM Financial Transaction Manager for Corporate Payment Services (FTM CPS) for
Multi-Platform could allow an authenticated user to obtain sensitive product
configuration information from log files.

Vulnerability Details

CVEID: CVE-2018-1670
DESCRIPTION: IBM Financial Transaction Manager for ACH Services for
Multi-Platform could allow an authenticated user to obtain sensitive product
configuration information from log files.
CVSS Base Score: 3.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
144946 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

FTM CPS v3.0.2.0 - 3.0.2.1

Remediation/Fixes

Product    VRMF      APAR          Remediation/First Fix

           3.0.2.0 -
FTM CPS    3.0.2.1   PH02830       3.0.2.1-FTM-CPS-MP-iFix0015

 
Workarounds and Mitigations

None

Change History

2 October 2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Product Alias/Synonym

FTM
FTM CPS

- --------------------------------------------------------------------------------

Security Bulletin: Financial Transaction Manager for Digital Payments for
Multi-Platform is affected by a potential SQL Injection vulnerability
CVE-2018-1819

Security Bulletin

Document information

More support for: Financial Transaction Manager

Software version: 3.2.0, 3.2.0.0

Operating system(s): Platform Independent

Reference #: 0732357

Modified date: 02 October 2018

Summary

Financial Transaction Manager for Digital Payments for Multi-Platform (FTM DP)
has addressed the following vulnerability: Potential SQL Injection
CVE-2018-1819

Vulnerability Details

CVEID: CVE-2018-1819
DESCRIPTION: IBM Financial Transaction Manager for Digital Payments for
Multi-Platform is vulnerable to SQL injection. A remote attacker could send
specially-crafted SQL statements, which could allow the attacker to view, add,
modify or delete information in the back-end database.
CVSS Base Score: 6.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
150023 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)

Affected Products and Versions

FTM DP v3.2.0.0

Remediation/Fixes

+-------+-------+-------+----------------------+
|Product| VRMF  | APAR  |Remediation/First Fix |
+-------+-------+-------+----------------------+
|FTM DP |3.2.0.0|PH03027|3.2.0-FTM-DP-MP-fp0001|
+-------+-------+-------+----------------------+

 

Workarounds and Mitigations

If you are not using the SOAP Web Services then remove the WebServices.ear from
your WebSphere Application Server instances.


Acknowledgement

None

Change History

2 October2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Product Alias/Synonym

FTM
FTM DP

- --------------------------------------------------------------------------------

Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect
Financial Transaction Manager for ACH Services

Security Bulletin

Document information

More support for: Financial Transaction Manager

Software version: 3.0.6

Operating system(s): Platform Independent

Reference #: 0731325

Modified date: 02 October 2018

Summary

There are multiple vulnerabilities in IBM(R) Runtime Environment Java(TM) Version 7
and 8 used by Financial Transaction Manager for ACH Services. Financial
Transaction Manager for ACH Services (FTM ACH) has addressed the applicable
CVEs.

Vulnerability Details

CVEID: CVE-2017-3732
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by a carry propagating bug in
 the x86_64 Montgomery squaring procedure. An attacker could exploit this
vulnerability to obtain information about the
private key.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
121313 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2017-3736
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by a carry propagation flaw i
n the x86_64 Montgomery squaring function bn_sqrx8x_internal(). An attacker
with online access to an unpatched system co
uld exploit this vulnerability to obtain information about the private key.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
134397 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID:  CVE-2018-1656
DESCRIPTION:  The IBM Java Runtime Environment's Diagnostic Tooling Framework
for Java (DTFJ) does not protect against path traversal attacks when extracting
compressed dump files.
CVSS Base Score: 7.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
144882 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N)

CVEID: CVE-2018-12539
DESCRIPTION: Eclipse OpenJ9 could allow a local attacker to gain elevated
privileges on the system, caused by the failure to restrict the use of Java
Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and
use Attach API operations to only the process owner. An attacker could exploit
this vulnerability to execute untrusted native code and gain elevated
privileges on the system.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
148389 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

FTM ACH: 3.0.6

Remediation/Fixes

Product VRMF   APAR   Remediation / First Fix

FTM ACH 3.0.6 PH02767 3.0.6-FTM-ACH-MP-fp0003

Workarounds and Mitigations

None

Acknowledgement

CVE-2018-1517 was reported to IBM by Michael Weissbacher

Change History

2 October 2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Product Alias/Synonym

FTM
FTM ACH


- --------------------------------------------------------------------------------

Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect
Financial Transaction Manager for Check Services

Security Bulletin

Document information

More support for: Financial Transaction Manager

Software version: 3.0.2

Operating system(s): Platform Independent

Reference #: 0731323

Modified date: 02 October 2018

Summary

There are multiple vulnerabilities in IBM(R) Runtime Environment Java(TM) Version 7
and 8 used by Financial Transaction Manager for Check Services. Financial
Transaction Manager for Check Services (FTM Check) has addressed the applicable
CVEs.

Vulnerability Details

CVEID: CVE-2017-3732
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by a carry propagating bug in
 the x86_64 Montgomery squaring procedure. An attacker could exploit this
vulnerability to obtain information about the
private key.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
121313 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2017-3736
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by a carry propagation flaw i
n the x86_64 Montgomery squaring function bn_sqrx8x_internal(). An attacker
with online access to an unpatched system co
uld exploit this vulnerability to obtain information about the private key.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
134397 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID:  CVE-2018-1656
DESCRIPTION:  The IBM Java Runtime Environment's Diagnostic Tooling Framework
for Java (DTFJ) does not protect against path traversal attacks when extracting
compressed dump files.
CVSS Base Score: 7.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
144882 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N)

CVEID: CVE-2018-12539
DESCRIPTION: Eclipse OpenJ9 could allow a local attacker to gain elevated
privileges on the system, caused by the failure to restrict the use of Java
Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and
use Attach API operations to only the process owner. An attacker could exploit
this vulnerability to execute untrusted native code and gain elevated
privileges on the system.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
148389 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

FTM Check: 3.0.2

Remediation/Fixes

 Product  VRMF   APAR      Remediation / First Fix

FTM Check 3.0.2 PH02769 3.0.2.1-FTM-Check-MP-iFix0015

Workarounds and Mitigations

None

Acknowledgement

CVE-2018-1517 was reported to IBM by Michael Weissbacher

Change History

2 October 2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Product Alias/Synonym

FTM
FTM Check



- --------------------------------------------------------------------------------

Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect
Financial Transaction Manager for Corporate Payment Services

Security Bulletin

Document information

More support for: Financial Transaction Manager

Software version: 3.0.2

Operating system(s): Platform Independent

Reference #: 0731337

Modified date: 02 October 2018

Summary

There are multiple vulnerabilities in IBM(R) Runtime Environment Java(TM) Version 8
used by Financial Transaction Manager for Corporate Payment Services. Financial
Transaction Manager for Corporate Payment Services (FTM CPS) has addressed the
applicable CVEs.

Vulnerability Details

CVEID: CVE-2017-3732
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by a carry propagating bug in
 the x86_64 Montgomery squaring procedure. An attacker could exploit this
vulnerability to obtain information about the
private key.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
121313 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2017-3736
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by a carry propagation flaw i
n the x86_64 Montgomery squaring function bn_sqrx8x_internal(). An attacker
with online access to an unpatched system co
uld exploit this vulnerability to obtain information about the private key.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
134397 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID:  CVE-2018-1656
DESCRIPTION:  The IBM Java Runtime Environment's Diagnostic Tooling Framework
for Java (DTFJ) does not protect against path traversal attacks when extracting
compressed dump files.
CVSS Base Score: 7.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
144882 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N)

CVEID: CVE-2018-12539
DESCRIPTION: Eclipse OpenJ9 could allow a local attacker to gain elevated
privileges on the system, caused by the failure to restrict the use of Java
Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and
use Attach API operations to only the process owner. An attacker could exploit
this vulnerability to execute untrusted native code and gain elevated
privileges on the system.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
148389 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

FTM CPS: 3.0.2.0 - 3.0.2.1

Remediation/Fixes

Product       VRMF         APAR     Remediation / First Fix

FTM CPS 3.0.2.0 - 3.0.2.1 PH02770 3.0.2.1-FTM-CPS-MP-iFix0015

Workarounds and Mitigations

None

Acknowledgement

CVE-2018-1517 was reported to IBM by Michael Weissbacher

Change History

2 October 2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Product Alias/Synonym

FTM
FTM CPS

- --------------------------------------------------------------------------------

Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect
Financial Transaction Manager for Digital Payments

Security Bulletin

Document information

More support for: Financial Transaction Manager

Software version: 3.2.0

Operating system(s): Platform Independent

Reference #: 0731331

Modified date: 02 October 2018

Summary

There are multiple vulnerabilities in IBM(R) Runtime Environment Java(TM) Version 8
used by Financial Transaction Manager for Digital Payments. Financial
Transaction Manager for Digital Payments (FTM DP) has addressed the applicable
CVEs.

Vulnerability Details

CVEID: CVE-2017-3732
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by a carry propagating bug in
 the x86_64 Montgomery squaring procedure. An attacker could exploit this
vulnerability to obtain information about the
private key.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
121313 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2017-3736
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by a carry propagation flaw i
n the x86_64 Montgomery squaring function bn_sqrx8x_internal(). An attacker
with online access to an unpatched system co
uld exploit this vulnerability to obtain information about the private key.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
134397 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID:  CVE-2018-1656
DESCRIPTION:  The IBM Java Runtime Environment's Diagnostic Tooling Framework
for Java (DTFJ) does not protect against path traversal attacks when extracting
compressed dump files.
CVSS Base Score: 7.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
144882 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N)

CVEID: CVE-2018-12539
DESCRIPTION: Eclipse OpenJ9 could allow a local attacker to gain elevated
privileges on the system, caused by the failure to restrict the use of Java
Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and
use Attach API operations to only the process owner. An attacker could exploit
this vulnerability to execute untrusted native code and gain elevated
privileges on the system.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
148389 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

FTM DP: 3.2.0

Remediation/Fixes

Product VRMF   APAR   Remediation / First Fix

FTM DP  3.2.0 PH02766 3.2.0-FTM-DP-MP-fp0001

Workarounds and Mitigations

None

Acknowledgement

CVE-2018-1517 was reported to IBM by Michael Weissbacher

Change History

2 October 2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Product Alias/Synonym

FTM
FTM DP

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=STQl
-----END PGP SIGNATURE-----

« Back to bulletins