-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.1843
         Vulnerabilties in IBM Platform Symphony - Java SDK/Tomcat
                                23 May 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Tomcat
                   Java SDK
Publisher:         IBM
Operating System:  Linux variants
                   Windows
Impact/Access:     Provide Misleading Information  -- Remote with User Interaction
                   Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                   Modify Arbitrary Files          -- Remote/Unauthenticated      
                   Denial of Service               -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-10245 CVE-2019-2698 CVE-2019-2697
                   CVE-2019-2684 CVE-2019-2602 CVE-2019-2449
                   CVE-2019-2426 CVE-2019-2422 CVE-2018-12549
                   CVE-2018-12547 CVE-2018-11784 CVE-2018-11212

Reference:         ASB-2019.0128
                   ASB-2019.0122
                   ASB-2019.0118
                   ASB-2019.0117

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=ibm10792795
   http://www.ibm.com/support/docview.wss?uid=ibm10885090

Comment: This bulletin contains two (2) IBM security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Vulnerability in Apache Tomcat affects IBM Platform Symphony

Security Bulletin

  Document information

   More support for: Platform Symphony

   Software version: 7.1 Fix Pack 1

   Operating system(s): Linux

   Reference #: 0792795

   Modified date: 22 May 2019

Summary

   This interim fix provides instructions on upgrading Apache Tomcat from
   v6.0.43 to v8.5.37 in IBM Platform Symphony 7.1 Fix Pack 1 in order to
   address security vulnerability CVE-2018-11784 in Apache Tomcat.

Vulnerability Details

   CVE-ID: CVE-2018-11784
   Description: Apache Tomcat could allow a remote attacker to conduct
   phishing attacks, caused by an open redirect vulnerability in the default
   servlet. An attacker could exploit this vulnerability using a
   specially-crafted URL  to redirect a victim to arbitrary Web sites.
   CVSS Base Score: 7.4
   CVSS Temporal Score:
   https://exchange.xforce.ibmcloud.com/vulnerabilities/150860 for more
   information
   CVSS Environmental Score*: Undefined
   CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N)

Affected Products and Versions

   Platform Symphony 7.1 Fix Pack 1

Remediation/Fixes

   Applicability
   Operating systems: Linux-x86_64
   Cluster type: Single grid cluster
   Packages

   +------------------------------------------------------------------------+
   |       Product        | APAR  |          Remediation/First Fix          |
   |----------------------+-------+-----------------------------------------|
   |IBM Platform Symphony |P102834|sym7.1_lnx26-lib23-x64_build509541.tar.gz|
   |7.1 Fix Pack 1        |       |                                         |
   |----------------------+-------+-----------------------------------------|
   |Apache Tomcat 8.5.37  |N/A    |apache-tomcat-8.5.37.tar.gz              |
   +------------------------------------------------------------------------+

For Platform Symphony 7.1 Fix Pack 1

   Installation

    1. Log on to the master host as the cluster administrator and stop the
       WEBGUI service:
       > egosh user logon -u Admin -x Admin
       > source $EGO_TOP/cshrc.platform
       > egosh service stop WEBGUI

    2. Log on to each management host in the cluster and back up the
       following files for recovery purposes:
       $EGO_TOP/gui/3.1/tomcat/
       $EGO_CONFDIR/../../gui/conf/catalina.policy
       $EGO_CONFDIR/../../gui/conf/catalina.properties
       $EGO_CONFDIR/../../gui/conf/server.xml$EGO_TOP/gui/ego/3.1/platform/WEB-INF/web.xml
       $EGO_TOP/gui/is/7.1/isgui/WEB-INF/web.xml
       $EGO_TOP/gui/perf/3.1/perfgui/WEB-INF/web.xml
       $EGO_TOP/gui/soam/7.1/soamgui/WEB-INF/web.xml
       $EGO_TOP/gui/soam/7.1/symgui/WEB-INF/web.xml

    3. Copy the apache-tomcat-8.5.37.tar.gz package to a temporary folder and
       decompress the file:
       > cp apache-tomcat-8.5.37.tar.gz /tmp
       > tar zxvf apache-tomcat-8.5.37.tar.gz
       > rm -rf apache-tomcat-8.5.37/conf/
       > rm -rf apache-tomcat-8.5.37/work/
       > rm -rf apache-tomcat-8.5.37/logs/

    4. Copy the Tomcat folder:
       > rm -rf $EGO_TOP/gui/3.1/tomcat
       > cp -rf apache-tomcat-8.5.37 $EGO_TOP/gui/3.1/tomcat

    5. Copy the sym7.1_lnx26-lib23-x64_build509541.tar.gz package and
       decompress it:
       > tar zxfo sym7.1_lnx26-lib23-x64_build509541.tar.gz -C $EGO_TOP

    6. If you ran the "egoconfig mghost shared_dir" command during
       installation to set up a shared location for configuration files,
       ensure that the configuration file is changed in the shared directory:
       > cp $EGO_TOP/gui/conf/catalina.policy
       $EGO_CONFDIR/../../gui/conf/catalina.policy
       > cp $EGO_TOP/gui/conf/catalina.properties
       $EGO_CONFDIR/../../gui/conf/catalina.properties
       > cp $EGO_TOP/gui/conf/server.xml
       $EGO_CONFDIR/../../gui/conf/server.xml

    7. If you modified the $EGO_CONFDIR/../../gui/conf/server.xml
       configuration file for details such as the GUI service port, manually
       redo those changes.

    8. Edit the web.xml files to add the following configuration:

         1. Edit each of the following files:
            $EGO_TOP/gui/ego/3.1/platform/WEB-INF/web.xml
            $EGO_TOP/gui/is/7.1/isgui/WEB-INF/web.xml
            $EGO_TOP/gui/perf/3.1/perfgui/WEB-INF/web.xml
            $EGO_TOP/gui/soam/7.1/symgui/WEB-INF/web.xml
            $EGO_TOP/gui/soam/7.1/soamgui/WEB-INF/web.xml

         2. Find the "<servlet-name>dwr-invoker</servlet-name>" line in the
            "</servlet>" section and add the following configuration:
            <init-param>
                    <param-name>crossDomainSessionSecurity</param-name>
                   <param-value>false</param-value>
            </init-param>
            For example:
            <servlet>
                <servlet-name>dwr-invoker</servlet-name>

            <servlet-class>org.directwebremoting.servlet.DwrServlet</servlet-class>
                                    <init-param>
                             <param-name>debug</param-name>
                         <param-value>true</param-value>
                       </init-param>
                      <init-param>
                         <param-name>crossDomainSessionSecurity</param-name>
                         <param-value>false</param-value>
                      </init-param>
            </servlet>

    9. On each management host, delete all subdirectories and files in the
       following directory:
       > rm -rf $EGO_TOP/gui/work/*

   10. On all client hosts, open your web browser and clear the browser
       cache.

   11. Start the WEBGUI service:
       > source $EGO_TOP/cshrc.platform
       > egosh service start WEBGUI

   12. In the $EGO_TOP/gui/logs/catalina.out file, check whether the GUI
       version indicates version 8.5.37:
       INFO: Server version:        Apache Tomcat/8.5.37

  Uninstallation

   Follow the instructions in this section to uninstall this update in your
   cluster, if required.

    1. Log on to the master host as the cluster administrator and stop the
       WEBGUI service:
       > egosh user logon -u Admin -x Admin
       > source $EGO_TOP/cshrc.platform
       > egosh service stop WEBGUI

    2. On each management host, restore the backup files:

         1. Remove the Tomcat folder, which was introduced by this interim
            fix:
            > rm -rf $EGO_TOP/gui/3.1/tomcat

         2. Restore the following folders and files from your backup:
            $EGO_TOP/gui/3.1/tomcat
            $EGO_CONFDIR/../../gui/conf/catalina.policy
            $EGO_CONFDIR/../../gui/conf/catalina.properties
            $EGO_CONFDIR/../../gui/conf/server.xml
            $EGO_TOP/gui/ego/3.1/platform/WEB-INF/web.xml
            $EGO_TOP/gui/is/7.1/isgui/WEB-INF/web.xml
            $EGO_TOP/gui/perf/3.1/perfgui/WEB-INF/web.xml
            $EGO_TOP/gui/soam/7.1/soamgui/WEB-INF/web.xml
            $EGO_TOP/gui/soam/7.1/symgui/WEB-INF/web.xml

    3. Delete all subdirectories and files in the following directory:
       > rm -rf $EGO_TOP/gui/work/*

    4. On all client hosts, open your web browser and clear the browser
       cache.

    5. Start the WEBGUI service:
       > source $EGO_TOP/cshrc.platform
       > egosh service start WEBGUI

Workarounds and Mitigations

   None

Acknowledgement

   None

Change History

   24 December 2018: Original version published
   22 May 2019: change status only

- -------------------------------------------------------------------------------------------

   Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM
                  Platform Symphony and IBM Spectrum Symphony

Security Bulletin

  Document information

   More support for: IBM Spectrum Symphony

   Software version: 7.1.2, 7.2.0.2, 7.2.1

   Operating system(s): Linux, Windows

   Reference #: 0885090

   Modified date: 22 May 2019

Summary

   There are multiple vulnerabilities in IBM(R) Runtime Environment Java(TM)
   Version 8 Service Refresh 5 Fix Pack 27 and earlier releases used by IBM
   Platform Symphony and IBM Spectrum Symphony. IBM Platform Symphony and IBM
   Spectrum Symphony have addressed the applicable CVEs.

   IBM is working to provide fixes for these vulnerabilities as soon as
   possible and will update this security bulletin when available.

Vulnerability Details

   If you run your own Java code using the IBM Java Runtime delivered with
   this product, you should evaluate your code to determine whether
   additional Java vulnerabilities are applicable to your code. For a
   complete list of vulnerabilities, refer to the "IBM Java SDK Security
   Bulletin", located in the References section for more information.

   CVEID:  CVE-2018-11212
   DESCRIPTION: libjpeg is vulnerable to a denial of service, caused by
   divide-by-zero error in the alloc_sarray function in jmemmgr.c. By
   persuading a victim to open a specially-crafted file, a remote attacker
   could exploit this vulnerability to cause the application to crash.
   CVSS Base Score: 3.3
   CVSS Temporal Score:
   See  https://exchange.xforce.ibmcloud.com/vulnerabilities/143429  for the
   current score
   CVSS Environmental Score*: Undefined
   CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)

   CVEID:  CVE-2019-2426
   DESCRIPTION: An unspecified vulnerability related to the Java SE
   Networking component could allow an unauthenticated attacker to obtain
   sensitive information resulting in a low confidentiality impact using
   unknown attack vectors.
   CVSS Base Score: 3.7
   CVSS Temporal Score:
   See  https://exchange.xforce.ibmcloud.com/vulnerabilities/155744  for the
   current score
   CVSS Environmental Score*: Undefined
   CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

   CVEID:  CVE-2019-2449
   DESCRIPTION: An unspecified vulnerability related to the Java SE
   Deployment component could allow an unauthenticated attacker to cause a
   denial of service resulting in a low availability impact using unknown
   attack vectors.
   CVSS Base Score: 3.1
   CVSS Temporal Score:
   See  https://exchange.xforce.ibmcloud.com/vulnerabilities/155766  for the
   current score
   CVSS Environmental Score*: Undefined
   CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L)

   CVEID:  CVE-2019-2422
   DESCRIPTION: An unspecified vulnerability related to the Java SE Libraries
   component could allow an unauthenticated attacker to obtain sensitive
   information resulting in a low confidentiality impact using unknown attack
   vectors.
   CVSS Base Score: 3.1
   CVSS Temporal Score:
   See  https://exchange.xforce.ibmcloud.com/vulnerabilities/155741  for the
   current score
   CVSS Environmental Score*: Undefined
   CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N)

   CVEID: CVE-2018-12547
   DESCRIPTION: Eclipse OpenJ9 is vulnerable to a buffer overflow, caused by
   improper bounds checking by the jio_snprintf() and jio_vsnprintf()
   functions. By sending an overly long argument, a remote attacker could
   overflow a buffer and execute arbitrary code on the system or cause the
   application to crash.
   CVSS Base Score: 9.8
   CVSS Temporal Score:
   See https://exchange.xforce.ibmcloud.com/vulnerabilities/157512 for more
   information
   CVSS Environmental Score*: Undefined
   CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

   CVEID: CVE-2018-12549
   DESCRIPTION: Eclipse OpenJ9 could allow a remote attacker to execute
   arbitrary code on the system, caused by the failure to omit a null check
   on the receiver object of an Unsafe call when accelerating it. An attacker
   could exploit this vulnerability to execute arbitrary code on the system.
   CVSS Base Score: 9.8
   CVSS Temporal Score:
   See https://exchange.xforce.ibmcloud.com/vulnerabilities/157513 for more
   information
   CVSS Environmental Score*: Undefined
   CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

   CVEID: CVE-2019-2698
   DESCRIPTION: An unspecified vulnerability related to the Java SE 2D
   component could allow an unauthenticated attacker to take control of the
   system.
   CVSS Base Score: 8.1
   CVSS Temporal Score:
   See https://exchange.xforce.ibmcloud.com/vulnerabilities/159790 for the
   current score
   CVSS Environmental Score*: Undefined
   CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

   CVEID: CVE-2019-2697
   DESCRIPTION: An unspecified vulnerability related to the Java SE 2D
   component could allow an unauthenticated attacker to take control of the
   system.
   CVSS Base Score: 8.1
   CVSS Temporal Score:
   See https://exchange.xforce.ibmcloud.com/vulnerabilities/159789 for the
   current score
   CVSS Environmental Score*: Undefined
   CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

   CVEID: CVE-2019-2602
   DESCRIPTION: An unspecified vulnerability related to the Java SE Libraries
   component could allow an unauthenticated attacker to cause a denial of
   service resulting in a high availability impact using unknown attack
   vectors.
   CVSS Base Score: 7.5
   CVSS Temporal Score:
   See https://exchange.xforce.ibmcloud.com/vulnerabilities/159698 for the
   current score
   CVSS Environmental Score*: Undefined
   CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

   CVEID: CVE-2019-2684
   DESCRIPTION: An unspecified vulnerability related to the Java SE RMI
   component could allow an unauthenticated attacker to cause no
   confidentiality impact, high integrity impact, and no availability impact.
   CVSS Base Score: 5.9
   CVSS Temporal Score:
   See https://exchange.xforce.ibmcloud.com/vulnerabilities/159776 for the
   current score
   CVSS Environmental Score*: Undefined
   CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)

   CVEID: CVE-2019-10245
   DESCRIPTION: Eclipse OpenJ9 is vulnerable to a denial of service, caused
   by the execution of a method past the end of bytecode array by the Java
   bytecode verifier. A remote attacker could exploit this vulnerability to
   cause the application to crash.
   CVSS Base Score: 7.5
   CVSS Temporal Score:
   See https://exchange.xforce.ibmcloud.com/vulnerabilities/160010 for more
   information
   CVSS Environmental Score*: Undefined
   CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

   IBM Platform Symphony 7.1 Fix Pack 1
   IBM Platform Symphony 7.1.1
   IBM Spectrum Symphony 7.1.2
   IBM Spectrum Symphony  7.2.0.2
   IBM Spectrum Symphony  7.2.1

Remediation/Fixes

   IBM is working to provide fixes for these vulnerabilities as soon as
   possible and will update this security bulletin when available.

Workarounds and Mitigations

   None

Get Notified about Future Security Bulletins

   Subscribe to My Notifications to be notified of important product support
   alerts like this.

Reference

   Complete CVSS v3 Guide
   On-line Calculator v3

   IBM Java SDK Security Bulletin

Related Information

   IBM Secure Engineering Web Portal
   IBM Product Security Incident Response Blog

Change History

   21 May 2019: Original version

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=kcbc
-----END PGP SIGNATURE-----