-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.0365
Security Bulletin: Multiple Vulnerabilities in Oracle Outside In Technology
                 affect IBM Rational DOORS Next Generation
                              7 February 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Rational DOORS Next Generation
Publisher:         IBM
Operating System:  Linux variants
                   Windows
Impact/Access:     Access Confidential Data -- Remote/Unauthenticated
                   Modify Permissions       -- Remote/Unauthenticated
                   Denial of Service        -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-3295 CVE-2017-3294 CVE-2017-3293
                   CVE-2017-3271 CVE-2017-3270 CVE-2017-3269
                   CVE-2017-3268 CVE-2017-3267 CVE-2017-3266

Reference:         ASB-2017.0005

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=swg21997654

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Multiple Vulnerabilities in Oracle Outside In Technology
affect IBM Rational DOORS Next Generation

Security Bulletin

Document information

More support for:

Rational DOORS Next Generation

General information

Software version:

6.0.2, 6.0.3

Operating system(s):

Linux, Windows

Software edition:

All Editions

Reference #:

1997654

Modified date:

06 February 2017

Summary

IBM Rational DOORS Next Generation is affected by multiple vulnerabilities in
the Oracle Outside In Technology that is used as a component.

Vulnerability Details

CVEID:

CVE-2017-3266

DESCRIPTION:

An unspecified vulnerability in Oracle Fusion Middleware related to the
Outside In Filters component has high confidentiality impact, low integrity
impact, and low availability impact.

CVSS Base Score: 8.6

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/120673

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L)

CVEID:

CVE-2017-3267

DESCRIPTION:

An unspecified vulnerability in Oracle Fusion Middleware related to the
Outside In Filters component has high confidentiality impact, low integrity
impact, and low availability impact.

CVSS Base Score: 8.6

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/120674

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L)

CVEID:

CVE-2017-3268

DESCRIPTION:

An unspecified vulnerability in Oracle Fusion Middleware related to the
Outside In Filters component has high confidentiality impact, low integrity
impact, and low availability impact.

CVSS Base Score: 8.6

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/120675

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L)

CVEID:

CVE-2017-3269

DESCRIPTION:

An unspecified vulnerability in Oracle Fusion Middleware related to the
Outside In Filters component has high confidentiality impact, low integrity
impact, and low availability impact.

CVSS Base Score: 8.6

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/120676

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L)

CVEID:

CVE-2017-3270

DESCRIPTION:

An unspecified vulnerability in Oracle Fusion Middleware related to the
Outside In Filters component has high confidentiality impact, low integrity
impact, and low availability impact.

CVSS Base Score: 8.6

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/120677

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L)

CVEID:

CVE-2017-3271

DESCRIPTION:

An unspecified vulnerability in Oracle Fusion Middleware related to the
Outside In Filters component has high confidentiality impact, low integrity
impact, and low availability impact.

CVSS Base Score: 8.6

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/120678

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L)

CVEID:

CVE-2017-3293

DESCRIPTION:

An unspecified vulnerability in Oracle Fusion Middleware related to the
Outside In Filters component has high confidentiality impact, low integrity
impact, and low availability impact.

CVSS Base Score: 8.6

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/120679

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L)

CVEID:

CVE-2017-3294

DESCRIPTION:

An unspecified vulnerability in Oracle Fusion Middleware related to the
Outside In Technology Outside In Filters component has high confidentiality
impact, low integrity impact, and low availability impact.

CVSS Base Score: 8.6

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/120680

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L)

CVEID:

CVE-2017-3295

DESCRIPTION:

An unspecified vulnerability in Oracle Fusion Middleware related to the
Outside In Technology Outside In Filters component has high confidentiality
impact, low integrity impact, and low availability impact.

CVSS Base Score: 8.6

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/120681

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L)

Affected Products and Versions

Rational DOORS Next Generation 6.0.2 (prior versions are not affected)

Rational DOORS Next Generation 6.0.3

Remediation/Fixes

Upgrade to version 6.0.2 iFix008

Rational DOORS Next Generation 6.0.2 iFix008

Rational DOORS Next Generation 6.0.3 iFix002

Workarounds and Mitigations

None

Important note

IBM strongly suggests that all System z customers be subscribed to the System
z Security Portal to receive the latest critical System z security and
integrity service. If you are not subscribed, see the instructions on the 
System z Security web site. Security and integrity APARs and associated 
fixes will be posted to this portal. IBM suggests reviewing the CVSS scores 
and applying all security or integrity fixes as soon as possible to minimize 
any potential risk.

References

Complete CVSS v3 Guide

On-line Calculator v3

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

Change History

Initial Publication: 6 February 2017

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=PuSD
-----END PGP SIGNATURE-----