-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.2046
             IBM Digital Business Automation Workflow patches
           vulnerabilities in inner WebSphere Application Server
                                7 June 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Digital Business Automation Workflow products
Publisher:         IBM
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Modify Arbitrary Files          -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-4279 CVE-2019-2684 CVE-2019-2602

Reference:         ASB-2019.0118
                   ESB-2019.2033
                   ESB-2019.1344

Original Bulletin: 
   https://www.ibm.com/support/docview.wss?uid=ibm10883984
   https://www.ibm.com/support/docview.wss?uid=ibm10885020

Comment: This bulletin contains two (2) IBM security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Multiple vulnerabilities have been identified in IBM
WebSphere Application Server shipped with IBM Digital Business Automation
Workflow family products (Java CPU April 2019)

Document information
Software version: 18.0.0.0, 18.0.0.1, 18.0.0.2, 19.0.0.1
Reference #: 0883984
Modified date: 06 June 2019

Summary

WebSphere Application Server is shipped as a component of IBM Business
Automation Workflow, IBM Business Process Manager, WebSphere Enterprise Service
Bus, and WebSphere Lombardi Edition. WebSphere Application Server Liberty is
shipped as a component of the optional BPM component Process Federation Server
and User Management Service. Information about security vulnerabilities
affecting IBM WebSphere Application Server Traditional and IBM WebSphere
Application Server Liberty have been published in a security bulletin.

Vulnerability Details

Please consult the security bulletin: Multiple Vulnerabilities in IBM Java SDK
affect WebSphere Application Server April 2019 CPU for vulnerability details
and information about fixes.

Affected Products and Versions

- - IBM Business Automation Workflow V18.0.0.0 through V19.0.0.1

- - IBM Business Process Manager V8.6.0.0 through V8.6.0.0 Cumulative Fix 2018.03

- - IBM Business Process Manager V8.5.7.0 through V8.5.7.0 Cumulative Fix 2017.06

- - IBM Business Process Manager V8.5.6.0 through V8.5.6.0 CF2

- - IBM Business Process Manager V8.5.5.0

- - IBM Business Process Manager V8.5.0.0 through V8.5.0.2

- - IBM Business Process Manager V8.0.0.0 through V8.0.1.3

- - IBM Business Process Manager V7.5.0.0 through V7.5.1.2

- - WebSphere Enterprise Service Bus V7.5.0.0 through V7.5.1.2

- - WebSphere Enterprise Service Bus V7.0.0.0 through V7.0.0.5 (and earlier
unsupported releases)

Note that Cumulative Fixes cannot automatically install interim fixes for the
base Application Server. It is important to follow the complete installation
instructions and manually ensure that recommended security fixes are installed.

For earlier and unsupported versions of the products, IBM recommends upgrading
to a fixed, supported version of the product.

Change History

60 June 2019: original document published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

                          Cross reference information
  Product    Component Platform                 Version                 Edition
IBM Business
  Process                       8.6.0.CF201803, 8.6.0.CF201712, 8.6
  Manager
                                8.6.0.CF201803, 8.6.0.CF201712, 8.6,
                                8.5.7.CF201706, 8.5.7.CF201703,
IBM Business                    8.5.7.CF201612, 8.5.7.CF201609,
  Process                       8.5.7.CF201606, 8.5.7, 8.5.6.2,
  Manager                       8.5.6.1, 8.5.6, 8.5.5, 8.5.0.2,
  Express                       8.5.0.1, 8.5, 8.0.1.3, 8.0.1.2,
                                8.0.1.1, 8.0.1, 8.0, 7.5.1.2, 7.5.1.1,
                                7.5.1, 7.5.0.1, 7.5
                                8.5.7.CF201706, 8.5.7.CF201703,
IBM Business                    8.5.7.CF201612, 8.5.7.CF201609,
  Process                       8.5.7.CF201606, 8.5.7, 8.5.6.2,
  Manager                       8.5.6.1, 8.5.6, 8.5.5, 8.5.0.2,
  Standard                      8.5.0.1, 8.5, 8.0.1.3, 8.0.1.2,
                                8.0.1.1, 8.0.1, 8.0, 7.5.1.2, 7.5.1.1,
                                7.5.1, 7.5.0.1, 7.5
                                8.6, 8.5.7.CF201706, 8.5.7.CF201703,
IBM Business                    8.5.7.CF201612, 8.5.7.CF201609,
  Process                       8.5.7.CF201606, 8.5.7, 8.5.6.2,
  Manager                       8.5.6.1, 8.5.6, 8.5.5, 8.5.0.2,
  Advanced                      8.5.0.1, 8.5, 8.0.1.3, 8.0.1.2,
                                8.0.1.1, 8.0.1, 8.0, 7.5.1.2, 7.5.1.1,
                                7.5.1, 7.5.0.1, 7.5
 WebSphere                      7.5.1.2, 7.5.1.1, 7.5.1, 7.5.0.1, 7.5,
 Enterprise                     7.0.0.5, 7.0.0.4, 7.0.0.3, 7.0.0.2,
Service Bus                     7.0.0.1, 7.0
IBM Business
  Process
  Manager                       8.6.0.0
 Enterprise
Service Bus
 WebSphere
 Enterprise
Service Bus                     Version Independent
  Registry
  Edition

- -------------------------------------------------------------------------------

Security Bulletin: A security vulnerability has been identified in IBM
WebSphere Application Server shipped with IBM Digital Business Automation
Workflow family products (CVE-2019-4279)

Document information
Software version: 18.0.0.0, 18.0.0.1, 18.0.0.2, 19.0.0.1
Reference #: 0885020
Modified date: 06 June 2019

Summary

WebSphere Application Server is shipped as a component of IBM Business
Automation Workflow and IBM Business Process Manager. Information about a
security vulnerability affecting IBM WebSphere Application Server Traditional
have been published in a security bulletin.

Vulnerability Details

Please consult the security bulletin: Remote code execution in WebSphere
Application Server ND (CVE-2019-4279) for vulnerability details and information
about fixes.

Affected Products and Versions

- - IBM Business Automation Workflow V18.0.0.0 through V19.0.0.1

- - IBM Business Process Manager Enterprise Service Bus V8.6.0.0 through V8.6.0.0
Cumulative Fix 2018.03

- - IBM Business Process Manager V8.6.0.0 through V8.6.0.0 Cumulative Fix 2018.03

- - IBM Business Process Manager V8.5.7.0 through V8.5.7.0 Cumulative Fix 2017.06

- - IBM Business Process Manager V8.5.6.0 through V8.5.6.0 CF2

- - IBM Business Process Manager V8.5.5.0

- - IBM Business Process Manager V8.5.0.0 through V8.5.0.2

Note that Cumulative Fixes cannot automatically install interim fixes for the
base Application Server. It is important to follow the complete installation
instructions and manually ensure that recommended security fixes are installed.

For earlier and unsupported versions of the products, IBM recommends upgrading
to a fixed, supported version of the product.

Change History

06 June 2019: original document published

                          Cross reference information
   Product     Component Platform                Version                Edition
 IBM Business
   Process                        8.6.0.CF201803, 8.6.0.CF201712, 8.6
   Manager
                                  8.6.0.CF201803, 8.6.0.CF201712, 8.6,
 IBM Business                     8.5.7.CF201706, 8.5.7.CF201703,
   Process                        8.5.7.CF201612, 8.5.7.CF201609,
   Manager                        8.5.7.CF201606, 8.5.7, 8.5.6.2,
   Express                        8.5.6.1, 8.5.6, 8.5.5, 8.5.0.2,
                                  8.5.0.1, 8.5
 IBM Business                     8.5.7.CF201706, 8.5.7.CF201703,
   Process                        8.5.7.CF201612, 8.5.7.CF201609,
   Manager                        8.5.7.CF201606, 8.5.7, 8.5.6.2,
   Standard                       8.5.6.1, 8.5.6, 8.5.5, 8.5.0.2,
                                  8.5.0.1, 8.5
 IBM Business                     8.6, 8.5.7.CF201706, 8.5.7.CF201703,
   Process                        8.5.7.CF201612, 8.5.7.CF201609,
   Manager                        8.5.7.CF201606, 8.5.7, 8.5.6.2,
   Advanced                       8.5.6.1, 8.5.6, 8.5.5, 8.5.0.2,
                                  8.5.0.1, 8.5
 IBM Business
   Process
   Manager                        8.6.0.0
  Enterprise
 Service Bus

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=7uh0
-----END PGP SIGNATURE-----