-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.1627
  Multiple vulnerabilities in IBM Java Runtime affect Rational Directory
            Server (Tivoli) & Rational Directory Administrator
                                9 May 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Rational Directory Server
Publisher:         IBM
Operating System:  Linux variants
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-12549 CVE-2018-12547 

Reference:         ESB-2019.1614
                   ESB-2019.1587
                   ESB-2019.1581
                   ESB-2019.1568

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=ibm10882042

- --------------------------BEGIN INCLUDED TEXT--------------------

Multiple vulnerabilities in IBM Java Runtime affect Rational Directory Server
(Tivoli) & Rational Directory Administrator

Product:             Rational Directory Server
Component:           General Information
Software version:    5.2.1
Operating system(s): Linux, Windows
Reference #:         0882042

Security Bulletin

Summary

There are multiple vulnerabilities in IBM Runtime Environment Java Version 7
and Version 8 used by Rational Directory Server (Tivoli) and Rational Directory
Administrator. These issues were disclosed as part of the IBM Java SDK updates
in January 2019. Upgrade the JRE in order to resolve these issues.

Vulnerability Details

Rational Directory Server & Rational Directory Administrator are affected by
the following vulnerabilities:

CVEID: CVE-2018-12549
DESCRIPTION: Eclipse OpenJ9 could allow a remote attacker to execute arbitrary
code on the system, caused by the failure to omit a null check on the receiver
object of an Unsafe call when accelerating it. An attacker could exploit this
vulnerability to execute arbitrary code on the system.
CVSS Base Score: 9.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
157513 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID: CVE-2018-12547
DESCRIPTION: Eclipse OpenJ9 is vulnerable to a buffer overflow, caused by
improper bounds checking by the jio_snprintf() and jio_vsnprintf() functions.
By sending an overly long argument, a remote attacker could overflow a buffer
and execute arbitrary code on the system or cause the application to crash.
CVSS Base Score: 9.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
157512 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

If you run your own Java code using the IBM Java Runtime delivered with this
product, you should evaluate your code to determine whether additional Java
vulnerabilities are applicable to your code. For a complete list of
vulnerabilities, refer to the "IBM Java SDK Security Bulletin", located in the
References section for more information.

Affected Products and Versions

Rational Directory Server (Tivoli) v5.2.1 iFix 13 and earlier. 
Rational Directory Administrator v6.0.0.2 iFix 06 and earlier. 

Remediation/Fixes

1. Download one of the following IBM JRE versions that contain the fixes for
these vulnerabilities:

  o IBM Java Runtime Environment, Version 7 R1 Service Refresh 4 Fix Pack 40
  o IBM Java Runtime Environment, Version 8 Service Refresh 5 Fix Pack 30

2. After downloading a fixed IBM JRE version, refer the following technote for
JRE upgrade instructions:

  o JRE Upgrade Instructions for Rational Directory Server (Tivoli) 5.2.1
  o JRE Upgrade Instructions for Rational Directory Administrator 6.0.0.x

NOTE:

To improve the robustness of LDAPS (secure LDAP over TLS) connections, endpoint
identification algorithms have been enabled by default.
There may be situations where some applications that were previously able to
successfully connect to an LDAPS server may no longer be able to do so.
With this LDAP update, LDAP is asking JSSE to validate the LDAP server's
certificate to ensure it is compliant with hostname verification. With this
change, if the server's certificate is not compliant, then exception will be
thrown. In the past, LDAP did not request JSSE to perform hostname verification
and a non-compliant server certificate would not have had caused an issue.

In order to resolve the issue, Regenerate the RDS server certificate
(tdsserverkey.kdb) so that the certificate's subject name or certificate's
subject alternate name matches the RDS server hostname, by following
instructions from technote:

How can I generate my own 'tdsserverkey.kdb' keystore for TLSv12 communication
and use it in a IBM Rational Directory Server (Tivoli) deployment

After regenerating the RDS Server certificate matching with the RDS Server
Hostname, use FQDN's wherever applicable.
E.g. : RDA Login Screen, Creating RDS Partition and DOORS to RDS Connection.

(If you have already regenerated the RDS Server certificate by following above
technote, while upgrading to IBM JRE versions 7.1.4.30 or later or 8.0.5.20 or
later, then no need to follow the technote again)

For versions of Rational Directory Server that are earlier than version 5.2.1,
and Rational Directory Administrator versions earlier than 6.0.0.2, IBM
recommends upgrading to a fixed, supported version/release/platform of the
product.

Workarounds and Mitigations

None

IBM Java SDK security bulletin

Change History

02 May 2019: Initial Publication

                          Cross reference information
         Product             Component     Platform        Version      Edition
   Rational Directory     General         Linux,      6.0, 6.0.0.1,
      Administrator       Information     Windows     6.0.0.2

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=4Fi/
-----END PGP SIGNATURE-----