-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.2115
         Multiple vulnerabilities in IBM Java SDK affect Rational
                  Reporting for Development Intelligence
                               14 June 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Rational Reporting for Development Intelligence
Publisher:         IBM
Operating System:  AIX
                   Linux variants
                   Windows
Impact/Access:     Access Privileged Data   -- Remote/Unauthenticated      
                   Increased Privileges     -- Existing Account            
                   Modify Arbitrary Files   -- Remote/Unauthenticated      
                   Denial of Service        -- Remote/Unauthenticated      
                   Access Confidential Data -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-12539 CVE-2018-2973 CVE-2018-2952
                   CVE-2018-1656 CVE-2018-1517 CVE-2017-3736
                   CVE-2017-3732 CVE-2016-0705 

Reference:         ASB-2019.0112
                   ESB-2019.1809
                   ESB-2019.1791
                   ASB-2018.0244

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=ibm10882754

- --------------------------BEGIN INCLUDED TEXT--------------------

Multiple vulnerabilities in IBM Java SDK affect Rational Reporting for
Development Intelligence

Product:             Rational Reporting for Development Intelligence
Component:           Report Server
Software version:    5.0, 5.0.1, 5.0.2
Operating system(s): AIX, Linux, Windows
Reference #:         0882754

Security Bulletin

Summary

There are vulnerabilities in IBM SDK Java Technology Edition Version 7 used by
Rational Reporting for Development Intelligence (RRDI). The issues were
disclosed as part of the IBM Java SDK updates in July 2018.

Vulnerability Details

CVEID: CVE-2017-3736
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by a carry propagation flaw in the x86_64 Montgomery
squaring function bn_sqrx8x_internal(). An attacker with online access to an
unpatched system could exploit this vulnerability to obtain information about
the private key.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
134397 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID: CVE-2017-3732
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive
information, caused by a carry propagating bug in the x86_64 Montgomery
squaring procedure. An attacker could exploit this vulnerability to obtain
information about the private key.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
121313 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2016-0705
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by a
double-free error when parsing DSA private keys. An attacker could exploit this
vulnerability to corrupt memory and cause a denial of service.
CVSS Base Score: 3.7
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
111140 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2018-1517
DESCRIPTION: A flaw in the java.math component in IBM SDK, Java Technology
Edition may allow an attacker to inflict a denial-of-service attack with
specially crafted String data.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
141681 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2018-1656
DESCRIPTION: The IBM Java Runtime Environment''s Diagnostic Tooling Framework
for Java (DTFJ) does not protect against path traversal attacks when extracting
compressed dump files.
CVSS Base Score: 7.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
144882 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N)

CVEID: CVE-2018-2973
DESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java
SE, Java SE Embedded JSSE component could allow an unauthenticated attacker to
cause no confidentiality impact, high integrity impact, and no availability
impact.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
146835 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)

CVEID: CVE-2018-2952
DESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java
SE, Java SE Embedded, JRockit Concurrency component could allow an
unauthenticated attacker to cause a denial of service resulting in a low
availability impact using unknown attack vectors.
CVSS Base Score: 3.7
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
146815 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2018-12539
DESCRIPTION: Eclipse OpenJ9 could allow a local attacker to gain elevated
privileges on the system, caused by the failure to restrict the use of Java
Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and
use Attach API operations to only the process owner. An attacker could exploit
this vulnerability to execute untrusted native code and gain elevated
privileges on the system.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
148389 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

+----------------------------------------+----------------------------------------+
|Principal Product and Version(s)        |Affected Supporting Product(s) and      |
|                                        |Version(s)                              |
+----------------------------------------+----------------------------------------+
|RRDI 5.0, 5.0.1 and 5.0.2               |Cognos BI 10.2.1 Fix pack 2             |
+----------------------------------------+----------------------------------------+

Remediation/Fixes

Apply the recommended fixes to all affected versions of RRDI.

Download the IBM Cognos Business Intelligence 10.2.1.1 Interim Fix 24
(Implemented by file 10.2.5013.516) .
Review technote 1679283: Installing Cognos Business Intelligence 10.2.1.x fix
pack in Rational Reporting for Development Intelligence 2.0.x/5.0.x and
Rational Insight 1.1.1.x for the detailed instructions for patch application.

Workarounds and Mitigations

None

Change History

29 April 2019: Initial Publication

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=mE6f
-----END PGP SIGNATURE-----