-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2018.2977.2
           Multiple vulnerabilities have been identified in IBM
                  Financial Transaction Manager products
                              21 January 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Financial Transaction Manager
Publisher:         IBM
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                   Access Privileged Data          -- Remote/Unauthenticated      
                   Create Arbitrary Files          -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-12539 CVE-2018-1819 CVE-2018-1670
                   CVE-2018-1656 CVE-2018-1517 CVE-2017-3736
                   CVE-2017-3732  

Reference:         ASB-2018.0170
                   ASB-2018.0093
                   ASB-2018.0092
                   ESB-2017.0488.3
                   ESB-2017.0386.2
                   ESB-2017.0317

Original Bulletin: 
   https://www.ibm.com/support/docview.wss?uid=ibm10732361
   https://www.ibm.com/support/docview.wss?uid=ibm10731547
   https://www.ibm.com/support/docview.wss?uid=ibm10732367
   https://www.ibm.com/support/docview.wss?uid=ibm10731549
   https://www.ibm.com/support/docview.wss?uid=ibm10732357
   https://www.ibm.com/support/docview.wss?uid=ibm10731325
   https://www.ibm.com/support/docview.wss?uid=ibm10731323
   https://www.ibm.com/support/docview.wss?uid=ibm10731337
   https://www.ibm.com/support/docview.wss?uid=ibm10731331

Comment: This bulletin contains ten (10) IBM security advisories.

Revision History:  January 21 2019: Updated Remediation/Fixes
                   October  4 2018: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Financial Transaction Manager for ACH Services for
Multi-Platform is affected by a potential SQL Injection vulnerability
CVE-2018-1819

Security Bulletin

Document information

More support for: Financial Transaction Manager

Software version: 3.0.6

Operating system(s): Platform Independent

Reference #: 0732361

Modified date: 02 October 2018

Summary

Financial Transaction Manager for ACH Services for Multi-Platform (FTM ACH) has
addressed the following vulnerability: Potential SQL Injection CVE-2018-1819

Vulnerability Details

CVEID: CVE-2018-1819
DESCRIPTION: IBM Financial Transaction Manager for Digital Payments for
Multi-Platform is vulnerable to SQL injection. A remote attacker could send
specially-crafted SQL statements, which could allow the attacker to view, add,
modify or delete information in the back-end database.
CVSS Base Score: 6.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
150023 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)

Affected Products and Versions

FTM ACH v3.0.6.0 - 3.0.6.2

Remediation/Fixes

+-------+-------------+-------+-----------------------+
|Product|    VRMF     | APAR  | Remediation/First Fix |
+-------+-------------+-------+-----------------------+
|FTM ACH|3.0.6-3.0.6.2|PH03029|3.0.6-FTM-ACH-MP-fp0003|
+-------+-------------+-------+-----------------------+

Workarounds and Mitigations

If you are not using the SOAP Web Services then remove the WebServices.ear from
your WebSphere Application Server instances.

Acknowledgement

None

Change History

2 October 2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Product Alias/Synonym

FTM
FTM ACH

- --------------------------------------------------------------------------------

Security Bulletin: Financial Transaction Manager for Check Services:
Information Leakage in configuration listing (CVE-2018-1670)

Security Bulletin

Document information

More support for: Financial Transaction Manager

Software version: 3.0.2

Operating system(s): Platform Independent

Reference #: 0731547

Modified date: 02 October 2018

Summary

IBM Financial Transaction Manager for Check Services (FTM CHK) for
Multi-Platform could allow an authenticated user to obtain sensitive product
configuration information from log files.

Vulnerability Details

CVEID: CVE-2018-1670
DESCRIPTION: IBM Financial Transaction Manager for ACH Services for
Multi-Platform could allow an authenticated user to obtain sensitive product
configuration information from log files.
CVSS Base Score: 3.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
144946 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

FTM CHK v3.0.2.0 - 3.0.2.1,

Remediation/Fixes

Product    VRMF      APAR          Remediation/First Fix

           3.0.2.0 -
FTM CHK    3.0.2.1   PH02829       3.0.2.1-FTM-Check-MP-iFix0015

Workarounds and Mitigations

None

Change History

2 October 2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Product Alias/Synonym

FTM
FTM CHK
FTM Check



- --------------------------------------------------------------------------------

Security Bulletin: Financial Transaction Manager for Corporate Payment Services
for Multi-Platform is affected by a potential SQL Injection vulnerability
CVE-2018-1819

Security Bulletin

Document information

More support for: Financial Transaction Manager

Software version: 3.0.2, 3.0.4

Operating system(s): Platform Independent

Reference #: 0732367

Modified date: 02 October 2018

Summary

Financial Transaction Manager for Corporate Payment Services for Multi-Platform
(FTM CPS) has addressed the following vulnerability: Potential SQL Injection
CVE-2018-1819

Vulnerability Details

CVEID: CVE-2018-1819
DESCRIPTION: IBM Financial Transaction Manager for Digital Payments for
Multi-Platform is vulnerable to SQL injection. A remote attacker could send
specially-crafted SQL statements, which could allow the attacker to view, add,
modify or delete information in the back-end database.
CVSS Base Score: 6.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
150023 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)

Affected Products and Versions

FTM CPS v3.0.2.0 - 3.0.2.1, v3.0.4.0

Remediation/Fixes

+-------+------------+-------+------------------------------------------------+
|Product|    VRMF    | APAR  |             Remediation/First Fix              |
+-------+------------+-------+------------------------------------------------+
|FTM CPS|3.0.2.0 -   |PH03030|A link to the fix will be added here before the |
|       |3.0.2.1     |       |bulletin is published                           |
+-------+------------+-------+------------------------------------------------+
|FTM CPS|3.0.4.0     |PH03030|A link to the fix will be added here before the |
|       |            |       |bulletin is published                           |
+-------+------------+-------+------------------------------------------------+

Workarounds and Mitigations

If you are not using the SOAP Web Services then remove the WebServices.ear from
your WebSphere Application Server instances.

Acknowledgement

None

Change History

9 March 2019: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Product Alias/Synonym

FTM
FTM CPS

- --------------------------------------------------------------------------------

Security Bulletin: Financial Transaction Manager for Corporate Payment
Services: Information Leakage in configuration listing (CVE-2018-1670)

Security Bulletin

Document information

More support for: Financial Transaction Manager

Software version: 3.0.2

Operating system(s): Platform Independent

Reference #: 0731549

Modified date: 02 October 2018

Summary

IBM Financial Transaction Manager for Corporate Payment Services (FTM CPS) for
Multi-Platform could allow an authenticated user to obtain sensitive product
configuration information from log files.

Vulnerability Details

CVEID: CVE-2018-1670
DESCRIPTION: IBM Financial Transaction Manager for ACH Services for
Multi-Platform could allow an authenticated user to obtain sensitive product
configuration information from log files.
CVSS Base Score: 3.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
144946 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

FTM CPS v3.0.2.0 - 3.0.2.1

Remediation/Fixes

Product    VRMF      APAR          Remediation/First Fix

           3.0.2.0 -
FTM CPS    3.0.2.1   PH02830       3.0.2.1-FTM-CPS-MP-iFix0015

 
Workarounds and Mitigations

None

Change History

2 October 2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Product Alias/Synonym

FTM
FTM CPS

- --------------------------------------------------------------------------------

Security Bulletin: Financial Transaction Manager for Digital Payments for
Multi-Platform is affected by a potential SQL Injection vulnerability
CVE-2018-1819

Security Bulletin

Document information

More support for: Financial Transaction Manager

Software version: 3.2.0, 3.2.0.0

Operating system(s): Platform Independent

Reference #: 0732357

Modified date: 02 October 2018

Summary

Financial Transaction Manager for Digital Payments for Multi-Platform (FTM DP)
has addressed the following vulnerability: Potential SQL Injection
CVE-2018-1819

Vulnerability Details

CVEID: CVE-2018-1819
DESCRIPTION: IBM Financial Transaction Manager for Digital Payments for
Multi-Platform is vulnerable to SQL injection. A remote attacker could send
specially-crafted SQL statements, which could allow the attacker to view, add,
modify or delete information in the back-end database.
CVSS Base Score: 6.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
150023 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)

Affected Products and Versions

FTM DP v3.2.0.0

Remediation/Fixes

+-------+-------+-------+----------------------+
|Product| VRMF  | APAR  |Remediation/First Fix |
+-------+-------+-------+----------------------+
|FTM DP |3.2.0.0|PH03027|3.2.0-FTM-DP-MP-fp0001|
+-------+-------+-------+----------------------+

 

Workarounds and Mitigations

If you are not using the SOAP Web Services then remove the WebServices.ear from
your WebSphere Application Server instances.


Acknowledgement

None

Change History

2 October2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Product Alias/Synonym

FTM
FTM DP

- --------------------------------------------------------------------------------

Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect
Financial Transaction Manager for ACH Services

Security Bulletin

Document information

More support for: Financial Transaction Manager

Software version: 3.0.6

Operating system(s): Platform Independent

Reference #: 0731325

Modified date: 02 October 2018

Summary

There are multiple vulnerabilities in IBM(R) Runtime Environment Java(TM) Version 7
and 8 used by Financial Transaction Manager for ACH Services. Financial
Transaction Manager for ACH Services (FTM ACH) has addressed the applicable
CVEs.

Vulnerability Details

CVEID: CVE-2017-3732
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by a carry propagating bug in
 the x86_64 Montgomery squaring procedure. An attacker could exploit this
vulnerability to obtain information about the
private key.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
121313 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2017-3736
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by a carry propagation flaw i
n the x86_64 Montgomery squaring function bn_sqrx8x_internal(). An attacker
with online access to an unpatched system co
uld exploit this vulnerability to obtain information about the private key.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
134397 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID:  CVE-2018-1656
DESCRIPTION:  The IBM Java Runtime Environment's Diagnostic Tooling Framework
for Java (DTFJ) does not protect against path traversal attacks when extracting
compressed dump files.
CVSS Base Score: 7.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
144882 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N)

CVEID: CVE-2018-12539
DESCRIPTION: Eclipse OpenJ9 could allow a local attacker to gain elevated
privileges on the system, caused by the failure to restrict the use of Java
Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and
use Attach API operations to only the process owner. An attacker could exploit
this vulnerability to execute untrusted native code and gain elevated
privileges on the system.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
148389 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

FTM ACH: 3.0.6

Remediation/Fixes

Product VRMF   APAR   Remediation / First Fix

FTM ACH 3.0.6 PH02767 3.0.6-FTM-ACH-MP-fp0003

Workarounds and Mitigations

None

Acknowledgement

CVE-2018-1517 was reported to IBM by Michael Weissbacher

Change History

2 October 2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Product Alias/Synonym

FTM
FTM ACH


- --------------------------------------------------------------------------------

Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect
Financial Transaction Manager for Check Services

Security Bulletin

Document information

More support for: Financial Transaction Manager

Software version: 3.0.2

Operating system(s): Platform Independent

Reference #: 0731323

Modified date: 02 October 2018

Summary

There are multiple vulnerabilities in IBM(R) Runtime Environment Java(TM) Version 7
and 8 used by Financial Transaction Manager for Check Services. Financial
Transaction Manager for Check Services (FTM Check) has addressed the applicable
CVEs.

Vulnerability Details

CVEID: CVE-2017-3732
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by a carry propagating bug in
 the x86_64 Montgomery squaring procedure. An attacker could exploit this
vulnerability to obtain information about the
private key.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
121313 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2017-3736
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by a carry propagation flaw i
n the x86_64 Montgomery squaring function bn_sqrx8x_internal(). An attacker
with online access to an unpatched system co
uld exploit this vulnerability to obtain information about the private key.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
134397 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID:  CVE-2018-1656
DESCRIPTION:  The IBM Java Runtime Environment's Diagnostic Tooling Framework
for Java (DTFJ) does not protect against path traversal attacks when extracting
compressed dump files.
CVSS Base Score: 7.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
144882 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N)

CVEID: CVE-2018-12539
DESCRIPTION: Eclipse OpenJ9 could allow a local attacker to gain elevated
privileges on the system, caused by the failure to restrict the use of Java
Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and
use Attach API operations to only the process owner. An attacker could exploit
this vulnerability to execute untrusted native code and gain elevated
privileges on the system.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
148389 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

FTM Check: 3.0.2

Remediation/Fixes

 Product  VRMF   APAR      Remediation / First Fix

FTM Check 3.0.2 PH02769 3.0.2.1-FTM-Check-MP-iFix0015

Workarounds and Mitigations

None

Acknowledgement

CVE-2018-1517 was reported to IBM by Michael Weissbacher

Change History

2 October 2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Product Alias/Synonym

FTM
FTM Check



- --------------------------------------------------------------------------------

Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect
Financial Transaction Manager for Corporate Payment Services

Security Bulletin

Document information

More support for: Financial Transaction Manager

Software version: 3.0.2

Operating system(s): Platform Independent

Reference #: 0731337

Modified date: 02 October 2018

Summary

There are multiple vulnerabilities in IBM(R) Runtime Environment Java(TM) Version 8
used by Financial Transaction Manager for Corporate Payment Services. Financial
Transaction Manager for Corporate Payment Services (FTM CPS) has addressed the
applicable CVEs.

Vulnerability Details

CVEID: CVE-2017-3732
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by a carry propagating bug in
 the x86_64 Montgomery squaring procedure. An attacker could exploit this
vulnerability to obtain information about the
private key.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
121313 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2017-3736
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by a carry propagation flaw i
n the x86_64 Montgomery squaring function bn_sqrx8x_internal(). An attacker
with online access to an unpatched system co
uld exploit this vulnerability to obtain information about the private key.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
134397 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID:  CVE-2018-1656
DESCRIPTION:  The IBM Java Runtime Environment's Diagnostic Tooling Framework
for Java (DTFJ) does not protect against path traversal attacks when extracting
compressed dump files.
CVSS Base Score: 7.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
144882 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N)

CVEID: CVE-2018-12539
DESCRIPTION: Eclipse OpenJ9 could allow a local attacker to gain elevated
privileges on the system, caused by the failure to restrict the use of Java
Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and
use Attach API operations to only the process owner. An attacker could exploit
this vulnerability to execute untrusted native code and gain elevated
privileges on the system.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
148389 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

FTM CPS: 3.0.2.0 - 3.0.2.1

Remediation/Fixes

Product       VRMF         APAR     Remediation / First Fix

FTM CPS 3.0.2.0 - 3.0.2.1 PH02770 3.0.2.1-FTM-CPS-MP-iFix0015

Workarounds and Mitigations

None

Acknowledgement

CVE-2018-1517 was reported to IBM by Michael Weissbacher

Change History

2 October 2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Product Alias/Synonym

FTM
FTM CPS

- --------------------------------------------------------------------------------

Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect
Financial Transaction Manager for Digital Payments

Security Bulletin

Document information

More support for: Financial Transaction Manager

Software version: 3.2.0

Operating system(s): Platform Independent

Reference #: 0731331

Modified date: 02 October 2018

Summary

There are multiple vulnerabilities in IBM(R) Runtime Environment Java(TM) Version 8
used by Financial Transaction Manager for Digital Payments. Financial
Transaction Manager for Digital Payments (FTM DP) has addressed the applicable
CVEs.

Vulnerability Details

CVEID: CVE-2017-3732
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by a carry propagating bug in
 the x86_64 Montgomery squaring procedure. An attacker could exploit this
vulnerability to obtain information about the
private key.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
121313 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2017-3736
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by a carry propagation flaw i
n the x86_64 Montgomery squaring function bn_sqrx8x_internal(). An attacker
with online access to an unpatched system co
uld exploit this vulnerability to obtain information about the private key.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
134397 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID:  CVE-2018-1656
DESCRIPTION:  The IBM Java Runtime Environment's Diagnostic Tooling Framework
for Java (DTFJ) does not protect against path traversal attacks when extracting
compressed dump files.
CVSS Base Score: 7.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
144882 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N)

CVEID: CVE-2018-12539
DESCRIPTION: Eclipse OpenJ9 could allow a local attacker to gain elevated
privileges on the system, caused by the failure to restrict the use of Java
Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and
use Attach API operations to only the process owner. An attacker could exploit
this vulnerability to execute untrusted native code and gain elevated
privileges on the system.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
148389 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

FTM DP: 3.2.0

Remediation/Fixes

Product VRMF   APAR   Remediation / First Fix

FTM DP  3.2.0 PH02766 3.2.0-FTM-DP-MP-fp0001

Workarounds and Mitigations

None

Acknowledgement

CVE-2018-1517 was reported to IBM by Michael Weissbacher

Change History

2 October 2018: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Product Alias/Synonym

FTM
FTM DP

- --------------------------------------------------------------------------------

Security Bulletin: Financial Transaction Manager for ACH Services: Information
Leakage in configuration listing (CVE-2018-1670)

Component: Financial Transaction Manager for ACH Services

Software version: 3.0.6

Operating system(s): Platform Independent

Reference #: 0731545

Modified date: 18 January 2019

Summary

IBM Financial Transaction Manager for ACH Services (FTM ACH) for Multi-Platform
could allow an authenticated user to obtain sensitive product configuration
information from log files.

Vulnerability Details

CVEID:  CVE-2018-1670
DESCRIPTION: IBM Financial Transaction Manager for ACH Services for
Multi-Platform could allow an authenticated user to obtain sensitive product
configuration information from log files.
CVSS Base Score: 3.1
CVSS Temporal Score: See  https://exchange.xforce.ibmcloud.com/vulnerabilities/
144946  for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

FTM ACH v3.0.6.0 - 3.0.6.4

Remediation/Fixes

Product    VRMF          APAR          Remediation/First Fix

FTM ACH    3.0.6-3.0.6.2 PH02828       3.0.6-FTM-ACH-MP-fp0005

Workarounds and Mitigations

None

Change History

18 January 2019: Original version published

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=AXOq
-----END PGP SIGNATURE-----