-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.1889
          IBM QRadar WinCollect Agent Does Not Verify TLS Syslog
                        Certificate (CVE-2019-4264)
                                27 May 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM QRadar SIEM
Publisher:         IBM
Operating System:  Linux variants
Impact/Access:     Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-4264  

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=ibm10885464

- --------------------------BEGIN INCLUDED TEXT--------------------

   Security Bulletin: IBM QRadar WinCollect Agent Does Not Verify TLS Syslog
                          Certificate (CVE-2019-4264)

   PSIRT

  Document information

   More support for: IBM QRadar SIEM

   Software version: 7.2.8

   Operating system(s): Linux

   Software edition: All Editions

   Reference #: 0885464

   Modified date: 24 May 2019

Security Bulletin

Summary

   When configured for TLS Syslog the Wincollect agent does not verify the
   authenticity or accuracy of the server certificate. Even when a
   certificate is specified within the WinCollect configuration it is
   ignored, and any certificate presented by the server is blindly accepted
   while negotiating TLS.

Vulnerability Details

   CVEID: CVE-2019-4264
   Description: IBM QRadar WinCollect could allow an attacker to obtain
   sensitive information by spoofing a trusted entity using man in the middle
   techniques due to not validating or incorrectly validating a certificate.
   CVSS Base Score: 5.9
   CVSS Temporal Score: See
   https://exchange.xforce.ibmcloud.com/vulnerabilities/160072 for the
   current score
   CVSS Environmental Score: *Undefined
   CVSS Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N


Affected Products and Versions

   WinCollect Agent 7.1.2 - WinCollect Agent 7.2.8 Patch 2 (32-bit)
   WinCollect Agent 7.1.2 - WinCollect Agent 7.2.8 Patch 2 (64-bit)

Remediation/Fixes

   WinCollect Agent 7.2.9 (32-bit)
   WinCollect Agent 7.2.9 (64-bit)

Workarounds and Mitigations

   None

Get Notified about Future Security Bulletins

   Subscribe to My Notifications to be notified of important product support
   alerts like this.

Reference

   Complete CVSS v3 Guide
   On-line Calculator v3

Related Information

   IBM Secure Engineering Web Portal
   IBM Product Security Incident Response Blog

Acknowledgement

   The vulnerability was reported to IBM by Steven Thompson and Jack Bahbah

Change History

   May 24th 2019: First Publish

   *The CVSS Environment Score is customer environment specific and will
   ultimately impact the Overall CVSS Score. Customers can evaluate the
   impact of this vulnerability in their environments by accessing the links
   in the Reference section of this Security Bulletin.

Disclaimer

   According to the Forum of Incident Response and Security Teams (FIRST),
   the Common Vulnerability Scoring System (CVSS) is an "industry open
   standard designed to convey vulnerability severity and help to determine
   urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS""
   WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF
   MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE
   RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY
   VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXOthoWaOgq3Tt24GAQhkihAAvFrVCfUvEPjWk0Bvav18p8E0knDpg8MI
32y1wSJErA+Regx3As+B/W88/GfvbEXnUv9+i0/ec2iuWxJuyoAXuxXEDMR69oKb
hzbZvps8iOz0YaNctX1yU2k9eV8xpchDwX7BY7dhN/7BJSdjpzJ0iq+cXCNchqMO
kXX34NxG4AAwyn3n+k6Kus6Mg/P4D794+eA2KFxDCZS8d/egrpSQiH5Bu682nFyl
G9EkEL7801RoT+4/WsJGZD8RutVAFjbf0K1igC4JIExhpPd19n/P0PASUBIOA4zM
RFfJTLX2guOQ5IxxD4x+ybNnxvGEs1Scc+qn+EGFEmaXwyZ9yHSk36yJRxoVDUzE
AbGyjdnom0dSrs3/ZxGiMbhpnAGVzNwYDl73UKrA2IhmO8yCZYoTSXypxSLFZW0h
iX+JxQxhjo/n/SCch7xChlryVvGxfWWmJn5UZ7w5QAtUygFEqJWyNCxkwryDU7Pt
wbZDI4DJX7mN79IVYM2+1uARAuos4oNjPiRwqak5l8X97Yak6C/M6m1C+OSwXBCn
eMDFrfzuzqB0TjL4Zz7P8SDx6/qmXnrq2KMlnHpsOoEW41KQFdgfC2rY7tq/0xbi
nKEj8msg+L0qg09NJv4rO4wB5e6wAxoto/7++9Yxg9L3wAlDlTe6rBpnuB+VSuNZ
cy5gqYVd2gk=
=jFyG
-----END PGP SIGNATURE-----