Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.2915 IBM MQ clients are vulnerable to a denial of service attack caused by consuming specifically crafted messages (CVE-2019-4261) 5 August 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM MQ Publisher: IBM Operating System: Linux variants Windows AIX HP-UX Solaris IBM i Impact/Access: Denial of Service -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2019-4261 Original Bulletin: http://www.ibm.com/support/docview.wss?uid=ibm10886887 - --------------------------BEGIN INCLUDED TEXT-------------------- IBM MQ clients are vulnerable to a denial of service attack caused by consuming specifically crafted messages (CVE-2019-4261) Product: IBM MQ Component: client Software version: 8.0.0.0, 8.0.0.1, 8.0.0.2, 8.0.0.3, 8.0.0.4, 8.0.0.5, 8.0.0.6, 8.0.0.7, 8.0.0.8, 8.0.0.9, 8.0.0.10, 8.0.0.11, 9.0.0.0, 9.0.0.1, 9.0.0.2, 9.0.0.3, 9.0.0.4, 9.0.0.5, 9.0.0.6, 9.1.0.0, 9.1.0.1, 9.1.0.2, 9.1.1, 9.1.2 Operating system(s): AIX, HP-UX, IBM i, Linux, Solaris, Windows Software edition: All Reference #: 0886887 Security Bulletin Summary An error was found with the IBM MQ client message handling logic that causes a denial of service attack when specifically crafted messages are consumed. Vulnerability Details CVEID: CVE-2019-4261 DESCRIPTION: IBM MQ Clients are vulnerable to a denial of service attack caused by specially crafted messages. CVSS Base Score: 4.3 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 160013 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) Affected Products and Versions IBM WebSphere MQ V7.1 versions 7.1.0.0 - 7.1.0.9 IBM WepSphere MQ V7.5 versions 7.5.0.0 - 7.5.0.9 IBM MQ V8 versions 8.0.0.0 - 8.0.0.11 IBM MQ V9.0LTS versions 9.0.0.0 - 9.0.0.6 IBM MQ V9.1 LTS versions 9.1.0.0 - 9.1.0.2 IBM MQ V9.1 CD versions 9.1.0 - 9.1.2 Remediation/Fixes IBM WebSphere MQ V7.1 Contact IBM Support to request a fix for APAR IT25916 IBM WepSphere MQ V7.5 Contact IBM Support to request a fix for APAR IT25916 IBM MQ V8 Apply Fixpack 8.0.0.12 IBM MQ V9.0LTS Apply Fixpack 9.0.0.7 IBM MQ V9.1 LTS Apply Fixpack 9.1.0.3 IBM MQ V9.1 CD Upgrade to IBM MQ 9.1.3 Workarounds and Mitigations None Change History 1st August 2019: Original version published - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXUepM2aOgq3Tt24GAQi9+w/7BpnmJaTPb53gQCoxbWvHbpMASGdkBFoX z2Kg4CaxgX3UCWslU5ewht0EFu9I+0zsi3U54jGdvb5Kc0z+Vz6NISHcm4tuTQAZ UXWN+jw1aBHIhiwxySU/TaSfP/xuXjfF1Ze6UyEMfDgkuosCVsuxgCuDx9AKwr7U odVgpacjER/ltL08dsM+qkqKaryZK471HvrbaE/Th5Maw81xi+H+sZ2dCuMyHyqZ jfAIDZjeFzRQFSYWe+ZFM1Zpv4gxjdA4cqzRuzP+JgnbiqitKQ2CCPrueFaAdI0H alpGChrAY1q760aK9ORZT26QummhF/IilRvoXFGL2GQs5HQ0wYNGacaPTE+teK9M 4I2LTRX0HB7xKy/HYiraYWQV0lwkp73i6CLEOeeSxr83/sNvpIeRQWcW+4muH/xk Erkdo1x7cn4FWiC6GZJuuhqLXsRdpf159MurSwOKkuiRFeHAAj0I3sMwRsUgq+Sk ySshZLKrLB4I5QsMvIbDZOUuWTY5yJPUDm59BU9Nb3DXp3jZS4x/OJNc4CMqAJ4R 5QYAf3SEuoc43kGE9uAec/F43/zV2rR6lJigIUbkxjKTftAautNOttsNyhGIpfZJ 7ovv0TcYpNOohuKjJSRzQHrNG0a4QrXa9SyaVcxvZ7PRte9v56z/dNsgKjV3vl1z i8H/QN+VOfU= =cAdO -----END PGP SIGNATURE-----