-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.2382
            A vulnerabilityin IBM Java Runtime affect Financial
         Transaction Manager for Check Services for Multi-Platform
                                1 July 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Financial Transaction Manager
Publisher:         IBM
Operating System:  Windows
                   Linux variants
                   AIX
Impact/Access:     Modify Arbitrary Files -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-2684  

Reference:         ASB-2019.0118
                   ESB-2019.2372
                   ESB-2019.2337
                   ESB-2019.1344

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=ibm10884044
   http://www.ibm.com/support/docview.wss?uid=ibm10884038
   http://www.ibm.com/support/docview.wss?uid=ibm10884050

Comment: This bulletin contains three (3) IBM security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

A vulnerabilityin IBM Java Runtime affect Financial Transaction Manager for
Check Services for Multi-Platform

Product:             Financial Transaction Manager
Component:           Financial Transaction Manager for Check Services
Software version:    3.0.2
Operating system(s): Platform Independent
Reference #:         0884044

Security Bulletin

Summary

There is a vulnerability in IBM Runtime Environment Java Version 7 or Version 8
used by Financial Transaction Manager for Check Services for Multi-Platform
(FMT CHK). Financial Transaction Manager for Check Services for Multi-Platform
has addressed the applicable CVE.

Vulnerability Details

CVEID: CVE-2019-2684
DESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java
SE, Java SE Embedded RMI component could allow an unauthenticated attacker to
cause no confidentiality impact, high integrity impact, and no availability
impact.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
159776 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)

Affected Products and Versions

FTM CHK: v3.0.2.0 - 3.0.2.1

Remediation/Fixes

VRMF   APAR      Remediation / First Fix

3.0.2 PH11963 3.0.2.1-FTM-Check-MP-iFix0018

Workarounds and Mitigations

None

Change History

28 June 2019: Original version published

Product Alias/Synonym

FTM
FTM CHK
FTM Check


- --------------------------------------------------------------------------------


Vulnerability in IBM Java Runtime affect Financial Transaction Manager for ACH
Services for Multi-Platform

Product:             Financial Transaction Manager
Component:           Financial Transaction Manager for ACH Services
Software version:    3.1.0
Operating system(s): Platform Independent
Reference #:         0884038

Security Bulletin

Summary

There is a vulnerability in IBM Runtime Environment Java Version 7 or Version 8
by Financial Transaction Manager for ACH Services for Multi-Platform (FTM ACH).
Financial Transaction Manager for ACH Services for Multi-Platform has addressed
the applicable CVE.

Vulnerability Details

CVEID: CVE-2019-2684
DESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java
SE, Java SE Embedded RMI component could allow an unauthenticated attacker to
cause no confidentiality impact, high integrity impact, and no availability
impact.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
159776 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)

Affected Products and Versions

FTM ACH: v3.1.0.0 - 3.1.0.3

Remediation/Fixes

Product      VRMF        APAR     Remediation / First Fix

FTM ACH 3.1.0.0-3.1.0.3 PH11962 3.1.0.3-FTM-ACH-MP-iFix0006

Workarounds and Mitigations

None

Change History

28 June 2019: Original version published

Product Alias/Synonym

FTM
FTM ACH


- --------------------------------------------------------------------------------


Scurity Bulletin: A vulnerability in IBM Java Runtime affect Financial
Transaction Manager for Corporate Payment Services for Multi-Platform v2.1.1


Document information

More support for: Financial Transaction Manager

Component: Financial Transaction Manager for Corporate Payment Services

Software version: 2.1.1

Operating system(s): Platform Independent

Reference #: 0884050

Modified date: 28 June 2019


Summary

There is a vulnerability in IBM(R) Runtime Environment Java(TM) Version 7 used by
Financial Transaction Manager for Corporate Payment Services for
Multi-Platform (FTM CPS). Financial Transaction Manager for Corporate Payment
Services for Multi-Platform has addressed the applicable CVE.

Vulnerability Details

CVEID: CVE-2019-2684
DESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the
Java SE, Java SE Embedded RMI component could allow an unauthenticated
attacker to cause no confidentiality impact, high integrity impact, and no
availability impact.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
159776 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)

Affected Products and Versions

FTM CPS: 2.1.1

Remediation/Fixes

Product VRMF   APAR   Remediation / First Fix

FTM CPS 2.1.1 PH11965 2.1.1-FTM-CPS-MP-fp0005

Workarounds and Mitigations

None

Change History

28 June 2019: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Product Alias/Synonym

FTM
FTM CPS

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=p9qP
-----END PGP SIGNATURE-----