ESB-2019.1083.2 - UPDATE [Win][UNIX/Linux][AIX] IBM Websphere Application Server: Multiple vulnerabilities 2019-04-02

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2019.1083.2
         Security Bulletin: Multiple Security Vulnerabilities have
              been Identified in Websphere Application Server
                               2 April 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Websphere Application Server
Publisher:         IBM
Operating System:  AIX
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Access Privileged Data         -- Remote/Unauthenticated
                   Denial of Service              -- Remote/Unauthenticated
                   Provide Misleading Information -- Remote/Unauthenticated
                   Unauthorised Access            -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-4080 CVE-2019-4046 CVE-2018-10237
                   CVE-2018-8039 CVE-2014-7810 

Reference:         ESB-2019.1059
                   ESB-2019.1056
                   ESB-2019.1055
                   ESB-2019.1031
                   ESB-2019.1013
                   ESB-2019.0961
                   ESB-2019.1058.2

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=ibm10878592
   http://www.ibm.com/support/docview.wss?uid=ibm10879119
   http://www.ibm.com/support/docview.wss?uid=ibm10879123
   http://www.ibm.com/support/docview.wss?uid=ibm10879017
   http://www.ibm.com/support/docview.wss?uid=ibm10869814
   http://www.ibm.com/support/docview.wss?uid=ibm10876202

Comment: This bulletin contains six (6) advisories.

Revision History:  April 2 2019: Added ibm10879119
                   April 1 2019: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: A Security Vulnerability has been Identified in Websphere
Application Server Shipped with Predictive Customer Intelligence
(CVE-2019-4080)

Document information

More support for: Predictive Customer Intelligence

Software version: 1.0, 1.0.1, 1.1, 1.1.1, 1.1.2

Operating system(s): Linux, Windows

Reference #: 0878592

Modified date: 29 March 2019

Summary

Websphere Application Server is shipped with Predictive Customer Intelligence.
Information about a security vulnerability affecting Websphere Application
Server has been published in a security bulletin.

Vulnerability Details

Please consult the security bulletin Security Bulletin: Potential denial of
service in WebSphere Application Server Admin Console (CVE-2019-4080) for
vulnerability details and information about fixes.

Affected Products and Versions

Predictive Customer Intelligence versions 1.0, 1.0.1, 1.1, 1.1.1, 1.1.2

Remediation/Fixes

+------------------+---------------+-----------------------------------------+
|                  |   Affected    |                                         |
|Principal Product |  Supporting   |  Affected Supporting Product Security   |
|  and Version(s)  |  Product and  |                Bulletin                 |
|                  |    Version    |                                         |
+------------------+---------------+-----------------------------------------+
|Predictive        |Websphere      |Security Bulletin: Potential denial of   |
|Customer          |Application    |service in WebSphere Application Server  |
|Intelligence 1.0  |Server 8.5.5   |Admin Console (CVE-2019-4080)            |
|and 1.0.1         |               |                                         |
+------------------+---------------+-----------------------------------------+
|Predictive        |Websphere      |Security Bulletin: Potential denial of   |
|Customer          |Application    |service in WebSphere Application Server  |
|Intelligence 1.1  |Server 8.5.6   |Admin Console (CVE-2019-4080)            |
|and 1.1.1         |               |                                         |
+------------------+---------------+-----------------------------------------+
|Predictive        |Websphere      |Security Bulletin: Potential denial of   |
|Customer          |Application    |service in WebSphere Application Server  |
|Intelligence 1.1.2|Server 9.0.0.4 |Admin Console (CVE-2019-4080)            |
+------------------+---------------+-----------------------------------------+


Workarounds and Mitigations

None


Change History

29 March 2019: Original document pubished

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.



================================================================================

Security Bulletin: A security vulnerability has been identified in IBM
WebSphere Application Server shipped with IBM ILOG Optimization Decision
Manager Enterprise (CVE-2019-4046)

Document information

More support for: IBM Decision Optimization Center

Software version: 3.6, 3.6.0.1

Operating system(s): AIX, Linux, Windows

Software edition: All Editions

Reference #: 0879123

Modified date: 29 March 2019

Summary

IBM WebSphere Application Server is shipped as a component of IBM ILOG ODM
Enterprise. Information about a security vulnerability affecting IBM WebSphere
Application Server has been published in a security bulletin.

Vulnerability Details

CVEID: CVE-2019-4046
DESCRIPTION: IBM WebSphere Application Server is vulnerable to a denial of
service, caused by improper handling of request headers. A remote attacker
could exploit this vulnerability to cause the consumption of Memory.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
156242 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

+------------------------------------------------+-------------------------------------------+
|        Principal Product and Version(s)        |  Affected Supporting Product and Version  |
+------------------------------------------------+-------------------------------------------+
|IBM ILOG ODM Enterprise v3.4 - v3.6.0.1         |IBM WebSphere Application Server 7.0       |
+------------------------------------------------+-------------------------------------------+

Remediation/Fixes

Please consult the security bulletin Potential denial of service vulnerability
in WebSphere Application Server for vulnerability details and information
about fixes.


Change History

29 March 2019: original document published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.



================================================================================

Security Bulletin: Potential bypass security vulnerability in Expression
Language library used by WebSphere Application Server (CVE-2014-7810) affects
IBM Security AppScan Enterprise

Document information

More support for: IBM Security AppScan Enterprise

Software version: 9.0.3.12

Operating system(s): Windows

Reference #: 0879017

Modified date: 29 March 2019

Summary

There is a potential bypass security vulnerability in the expression language
library used by WebSphere Application Server (CVE-2014-7810) used with IBM
Security AppScan Enterprise.

Vulnerability Details

CVEID:  CVE-2014-7810
DESCRIPTION: Apache Tomcat could allow a remote attacker to bypass security
restrictions, caused by the use of expression language. An attacker could
exploit this vulnerability to bypass the protections of a Security Manager.
CVSS Base Score: 5
CVSS Temporal Score: See  https://exchange.xforce.ibmcloud.com/vulnerabilities
/103155 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N)

Affected Products and Versions

IBM AppScan Enterprise 9.0.3.0 - 9.0.3.11

Remediation/Fixes

+---------------+---------+--------------------------------------------------+
|               |         |                                                  |
|Product        |VRMF     |Remediation/First Fix                             |
|               |         |                                                  |
+---------------+---------+--------------------------------------------------+
|IBM Security   |9.0.3.0 -|Upgrade to version 9.0.3.12. For details refer the|
|AppScan        |9.0.3.11 |link https://www.ibm.com/support/docview.wssuid= |
|Enterprise     |         |ibm10878228                                       |
+---------------+---------+--------------------------------------------------+


*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.



================================================================================

Security Bulletin: Vulnerabilities in IBM WebSphere Application Server Liberty
affect IBM Spectrum Protect Snapshot for VMware (CVE-2014-7810, CVE-2018-8039)

Document information

More support for: IBM Spectrum Protect Snapshot

Component: FlashCopy Manager for VMware

Software version: 4.1

Operating system(s): Linux

Reference #: 0869814

Modified date: 29 March 2019

Summary

IBM WebSphere Application Server Liberty is affected by Apache Tomcat and CXF
vulnerabilities that affect IBM Spectrum Protect Snapshot (formerly Tivoli
Storage FlashCopy Manager) for VMware.

Vulnerability Details

CVEID: CVE-2014-7810
DESCRIPTION: Apache Tomcat could allow a remote attacker to bypass security
restrictions, caused by the use of expression language. An attacker could
exploit this vulnerability to bypass the protections of a Security Manager.
CVSS Base Score: 5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
103155
for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVEID: CVE-2018-8039
DESCRIPTION: Apache CXF could allow a remote attacker to conduct a
man-in-the-middle attack. The TLS hostname verification does not work
correctly with com.sun.net.ssl interface. An attacker could exploit this
vulnerability to launch a man-in-the-middle attack.
CVSS Base Score: 7.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
145516 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
     

Affected Products and Versions

The following levels of IBM Spectrum Protect Snapshot (formerly Tivoli Storage
FlashCopy Manager) for VMware are affected:

  o 4.1.0.0 through 4.1.6.6

Remediation/Fixes

+-------------------+--------+----------+-------------------------------------------------------+
|                   |First   |Platform  |                                                       |
|IBM Spectrum       |Fixing  |          |                                                       |
|Protect Snapshot   |VRMF    |          |                                                       |
|for VMware Release |Level   |          |Link to Fix                                            |
+-------------------+--------+----------+-------------------------------------------------------+
|  4.1              |4.1.6.7 |Linux     |ftp://public.dhe.ibm.com/storage/                      |
|		    |        |		|tivoli-storage-flashcopymanager/patches/v4r1/vmware/   |
|                   |        |          |v4167/patches/v4r1/vmware/v4167/                       |
+-------------------+--------+----------+-------------------------------------------------------+

Workarounds and Mitigations

None


Change History

29 March 2019 - original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

                         Cross reference information
          Product                   Component         Platform Version Edition
  Tivoli Storage FlashCopy   FlashCopy Manager for    Linux    4.1
          Manager            VMware



================================================================================

Security Bulletin: Vulnerability in IBM WebSphere Application Server Liberty
affects IBM Watson Compare and Comply on IBM Cloud Private

Document information

More support for: Watson Developer Cloud

Component: IBM Watson Compare and Comply

Software version: All Versions

Operating system(s): Platform Independent

Reference #: 0876202

Modified date: 22 March 2019

Summary

There is a potential denial of service with the Google Guava library that is
used in WebSphere Application Server Liberty which in turn is used by IBM
Watson(TM) Compare and Comply on IBM Cloud Private.

Vulnerability Details

CVEID: CVE-2018-10237
DESCRIPTION: Google Guava is vulnerable to a denial of service, caused by
improper eager allocation checks in the AtomicDoubleArray and CompoundOrdering
class. By sending a specially-crafted data, a remote attacker could exploit
this vulnerability to cause a denial of service condition.
CVSS Base Score: 7.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
142508 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

This vulnerability affects IBM Watson Compare and Comply V1.0.4 through
V1.1.3.

Remediation/Fixes

+--------+-------------+----------------------------------------------+
|Affected|Affected     |Fix                                           |
|product |versions     |                                              |
+--------+-------------+----------------------------------------------+
|        |             |Upgrade to IBM Watson Compare and Comply:     |
|        |             |Element Classification V1.1.4. To download the|
|        |             |software, go to Passport Advantage , search   |
|IBM     |             |for "compare and comply," and select IBM      |
|Watson  |             |Watson Compare and Comply Element             |
|Compare |V1.0.4-V1.1.3|Classification Readme Linux English eAssembly,|
|and     |             |part number CNX9JEN.                          |
|Comply  |             |                                              |
|        |             |For information about this version, see the   |
|        |             |release notes . For information about         |
|        |             |deployment, see the deployment procedure .    |
+--------+-------------+----------------------------------------------+

Workarounds and Mitigations

None.


Change History

22 March 2019: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

================================================================================

Security Bulletin: A security vulnerability has been identified in IBM
WebSphere Application Server shipped with IBM ILOG Optimization Decision
Manager Enterprise (CVE-2019-4080)

Document information

More support for: IBM Decision Optimization Center

Software version: 3.6, 3.6.0.1

Operating system(s): AIX, Linux, Windows

Software edition: All Editions

Reference #: 0879119

Modified date: 01 April 2019

Summary

IBM WebSphere Application Server is shipped as a component of IBM ILOG ODM
Enterprise. Information about a security vulnerability affecting IBM WebSphere
Application Server has been published in a security bulletin.

Vulnerability Details

CVEID: CVE-2019-4080
DESCRIPTION: IBM WebSphere Application Server Admin Console is vulnerable to a
potential denial of service, caused by improper parameter parsing. A remote
attacker could exploit this to consume all available CPU resources.
CVSS Base Score: 6.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
157380 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

+------------------------------------------------+-------------------------------------------+
|        Principal Product and Version(s)        |  Affected Supporting Product and Version  |
+------------------------------------------------+-------------------------------------------+
|IBM ILOG ODM Enterprise v3.4 - v3.6.0.1         |IBM WebSphere Application Server 7.0       |
+------------------------------------------------+-------------------------------------------+

Remediation/Fixes

Please consult the security bulletin Potential denial of service in WebSphere
Application Server Admin Console for vulnerability details and information
about fixes.


Change History

1 April 2019: original document published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=1FEX
-----END PGP SIGNATURE-----

« Back to bulletins