-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.0085
   GDS component of IBM InfoSphere Master Data Management Collaborative
           Edition affected by various security vulnerabilities
                              13 January 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM InfoSphere Master Data Management
Publisher:         IBM
Operating System:  AIX
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Access Privileged Data          -- Remote with User Interaction
                   Provide Misleading Information  -- Remote with User Interaction
                   Access Confidential Data        -- Existing Account            
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-7414 CVE-2015-4960 CVE-2015-4958

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21971545

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: GDS component of IBM InfoSphere Master Data Management
Collaborative Edition affected by various security vulnerabilities
(CVE-2015-4960, CVE-2015-4958, CVE-2015-7414)

Security Bulletin

Document information

More support for:

InfoSphere Master Data Management

Software version:

9.1, 10.1, 10.1.0, 11.0, 11.0.0, 11.3, 11.4

Operating system(s):

AIX

Software edition:

Collaborative Edition

Reference #:

1971545

Modified date:

2016-01-12

Summary

GDS component of IBM InfoSphere Master Data Management - Collaborative
Edition is vulnerable to Cross-Site Scripting, Caching of HTTP response and
Click-Jacking vulnerabilities.

Vulnerability Details

CVEID:

CVE-2015-4960

DESCRIPTION:

IBM InfoSphere Master Data Management - Collaborative Edition could allow a
remote attacker to hijack the clicking action of the victim. By persuading a
victim to visit a malicious Web site, a remote attacker could send a
specially-crafted HTTP request to hijack the victim's click actions or launch
other client-side browser attacks.

CVSS Base Score: 4.1

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/105403

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N)

CVEID:

CVE-2015-4958

DESCRIPTION:

IBM InfoSphere Master Data Management - Collaborative Edition could allow a
local attacker to retrieve sensitive information due to browser cache being
stored on the system.

CVSS Base Score: 4

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/105252

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID:

CVE-2015-7414

DESCRIPTION:

GDS component of IBM InfoSphere Master Data Management Collaborative Edition
is vulnerable to cross-site scripting, caused by improper validation of user-
supplied input. A remote attacker could exploit this vulnerability using a
specially-crafted URL to execute script in a victim's Web browser within the
security context of the hosting Web site, once the URL is clicked. An
attacker could use this vulnerability to steal the victim's cookie-based
authentication credentials.

CVSS Base Score: 5.4

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/107572

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

IBM InfoSphere Master Data Management Collaborative Edition Versions 11.4,
11.3, 11.0, 10.1, 9.1.

Remediation/Fixes

The recommended solution is to apply the fix as soon as practical. Please see
below for information on the fixes available.

Product                                                                              VRMF  APAR    Remediation/First Fix
IBM InfoSphere Master Data Man-agement - Collaborative Edition                       11.4  None    MDMCS 11.4.0.4-IF1
IBM InfoSphere Master Data Man-agement - Collaborative Edition                       11.3  None    MDMCS 11.3.0.0-IF7
IBM InfoSphere Master Data Man-agement - Collaborative Edition                       11    None    MDMCS 11.0.0.0-IF11
IBM InfoSphere Master Data Man-agement - Collaborative Edition                       10.1  None    Contact IBM Support Team to upgrade Version 11.0 and above
IBM InfoSphere Master Data Man-agement Server for Product Infor-mation Management    9.1   None    Contact IBM Support Team to upgrade Version 11.0 and above

Workarounds and Mitigations

None known

Get Notified about Future Security Bulletins

Subscribe to

My Notifications

to be notified of important product support alerts like this.

References

Complete CVSS v3 Guide

On-line Calculator v3

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

Acknowledgement

None

Change History

12-January-2016: Original Version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=okjh
-----END PGP SIGNATURE-----