-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.2005
Multiple vulnerabilities in IBM Java SDK affects IBM SAN Volume Controller,
    IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products
                                5 June 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM SAN Volume Controller
Publisher:         IBM
Operating System:  Network Appliance
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Modify Arbitrary Files          -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Access Confidential Data        -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-12547 CVE-2018-3180 

Reference:         ASB-2018.0290
                   ASB-2018.0256
                   ESB-2019.1999
                   ESB-2019.1998

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=ibm10884526

- --------------------------BEGIN INCLUDED TEXT--------------------

Multiple vulnerabilities in IBM Java SDK affects IBM SAN Volume Controller, IBM
Storwize, IBM Spectrum Virtualize and IBM FlashSystem products

Product:             SAN Volume Controller
Operating system(s): Appliance
Reference #:         0884526

Security Bulletin

Summary

Multiple vulnerabilities in the IBM Runtime Environment Java Technology Edition
affect IBM SAN Volume Controller, IBM Storwize V7000, V5000, V3700 and V3500,
IBM Spectrum Virtualize Software, IBM Spectrum Virtualize for Public Cloud and
IBM FlashSystem V9000 and 9100 family products. The applicable vulnerabilities
are CVE-2018-3180 and CVE-2018-12547.

Vulnerability Details

CVEID: CVE-2018-3180
DESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java
SE, Java SE Embedded, JRockit JSSE component could allow an unauthenticated
attacker to cause low confidentiality impact, low integrity impact, and low
availability impact.
CVSS Base Score: 5.6
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
151497 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)

CVEID: CVE-2018-12547
DESCRIPTION: Eclipse OpenJ9 is vulnerable to a buffer overflow, caused by
improper bounds checking by the jio_snprintf() and jio_vsnprintf() functions.
By sending an overly long argument, a remote attacker could overflow a buffer
and execute arbitrary code on the system or cause the application to crash.
CVSS Base Score: 9.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
157512 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

IBM SAN Volume Controller
IBM Storwize V7000
IBM Storwize V5000
IBM Storwize V3700
IBM Storwize V3500
IBM FlashSystem V9000
IBM FlashSystem 9100 Family
IBM Spectrum Virtualize Software
IBM Spectrum Virtualize for Public Cloud

All products are affected when running supported versions 7.5 to 8.2.

Remediation/Fixes

IBM recommends that you fix this vulnerability by upgrading affected versions
of IBM SAN Volume Controller, IBM Storwize V7000, V5000, V3700 and V3500, IBM
Spectrum Virtualize Software, IBM Spectrum Virtualize for Public Cloud and IBM
FlashSystem V9000 and 9100 family to the following code levels or higher:

7.8.1.10
8.1.3.6
8.2.1.4

Latest IBM SAN Volume Controller Code
Latest IBM Storwize V7000 Code
Latest IBM Storwize V5000 Code
Latest IBM Storwize V3700 Code
Latest IBM Storwize V3500 Code
Latest IBM FlashSystem V9000 Code
Latest IBM FlashSystem 9100 Family Code
Latest IBM Spectrum Virtualize Software
Latest IBM Spectrum Virtualize for Public Cloud

For unsupported versions of the above products, IBM recommends upgrading to a
fixed, supported version of code.

Workarounds and Mitigations

Although IBM recommends that you install a level of code with a fix for this
vulnerability, you can mitigate, although not eliminate, your risk until you
have done so by ensuring that all users who have access to the system are
authenticated by another security system such as a firewall.

                          Cross reference information
                Product                 Component Platform    Version   Edition
       IBM Storwize V7000 (2076)                  Appliance All
                                                            Versions
          IBM Storwize V5000                      Appliance All
                                                            Versions
         IBM FlashSystem V9000                    Appliance All
                                                            Versions
   IBM Spectrum Virtualize software               Appliance All
                                                            Versions
  IBM Spectrum Virtualize for Public              Appliance All
                 Cloud                                      Versions
       IBM Storwize V3500 (2071)                  Appliance All
                                                            Versions
       IBM Storwize V3700 (2072)                  Appliance All
                                                            Versions
      IBM FlashSystem 9100 family                 Appliance All
                                                            Versions

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Jc3c
-----END PGP SIGNATURE-----