-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.3798
          Multiple vulnerabilities in IBM HTTP Server affect IBM
           Security Access Manager for Enterprise Single Sign-On
                              10 October 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          IBM Security Access Manager for Enterprise
Publisher:        IBM
Operating System: AIX
                  HP-UX
                  Linux variants
                  Windows
Impact/Access:    Denial of Service              -- Remote/Unauthenticated      
                  Cross-site Scripting           -- Remote with User Interaction
                  Provide Misleading Information -- Remote/Unauthenticated      
Resolution:       Patch/Upgrade
CVE Names:        CVE-2019-10098 CVE-2019-10092 CVE-2018-20843

Reference:        ESB-2019.3557
                  ESB-2019.3525
                  ESB-2019.3408

- --------------------------BEGIN INCLUDED TEXT--------------------

   Security Bulletin: Multiple vulnerabilities in IBM HTTP Server affect IBM
             Security Access Manager for Enterprise Single Sign-On

  Security Bulletin

Summary

   These issues were also addressed by IBM WebSphere Application Server
   shipped with IBM Security Access Manager for Enterprise Single Sign-On.

Vulnerability Details

   CVEID: CVE-2018-20843
   DESCRIPTION: libexpat is vulnerable to a denial of service, caused by an
   error in the XML parser. By persuading a victim to open a
   specially-crafted file, a remote attacker could exploit this vulnerability
   to consume all available CPU resources.
   CVSS Base Score: 3.3
   CVSS Temporal Score: See
   https://exchange.xforce.ibmcloud.com/vulnerabilities/163073 for the
   current score
   CVSS Environmental Score*: Undefined
   CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L)


   CVEID: CVE-2019-10092
   DESCRIPTION: Apache HTTP Server is vulnerable to cross-site scripting,
   caused by improper validation of user-supplied input by the mod_proxy
   error page. A remote attacker could cause the link on the error page to be
   malfomed and instead point to a page of their choice. An attacker could
   use this vulnerability to steal the victim''s cookie-based authentication
   credentials.
   CVSS Base Score: 4.7
   CVSS Temporal Score: See
   https://exchange.xforce.ibmcloud.com/vulnerabilities/165367 for the
   current score
   CVSS Environmental Score*: Undefined
   CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N)

   CVEID: [23]CVE-2019-10098
   DESCRIPTION: Apache HTTP Server could allow a remote attacker to conduct
   phishing attacks, caused by an open redirect vulnerability in the
   mod_rewrite module. An attacker could exploit this vulnerability using a
   specially-crafted URL to redirect a victim to arbitrary Web sites.
   CVSS Base Score: 3.7
   CVSS Temporal Score: See
   https://exchange.xforce.ibmcloud.com/vulnerabilities/165366 for the
   current score
   CVSS Environmental Score*: Undefined
   CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)

Affected Products and Versions

   IBM Security Access Manager for Enterprise Single Sign-On 8.2.1, 8.2.2

Remediation/Fixes

   Refer to the following security bulletins for vulnerability details and
   information about fixes addressed by IBM WebSphere Application Server
   which is shipped with IBM Security Access Manager for Enterprise Single
   Sign-On.

   +------------------------------------------------------------------------+
   |Principal Product and|Affected Supporting| Affected Supporting Product  |
   |     Version(s)      |Product and Version|      Security Bulletin       |
   |---------------------+-------------------+------------------------------|
   |IBM Security Access  |IBM WebSphere      |[1]Security Bulletin:         |
   |Manager for          |Application Server |Multiple vulnerabilities in   |
   |Enterprise Single    |8.5                |IBM HTTP Server used by       |
   |Sign-On 8.2.1        |                   |WebSphere Application Server  |
   |---------------------+-------------------+------------------------------|
   |IBM Security Access  |IBM WebSphere      |[1]Security Bulletin:         |
   |Manager for          |Application Server |Multiple vulnerabilities in   |
   |Enterprise Single    |8.5                |IBM HTTP Server used by       |
   |Sign-On 8.2.2        |                   |WebSphere Application Server  |
   +------------------------------------------------------------------------+

[1] https://www.ibm.com/support/pages/node/964768

Workarounds and Mitigations

   None

   *The CVSS Environment Score is customer environment specific and will
   ultimately impact the Overall CVSS Score. Customers can evaluate the
   impact of this vulnerability in their environments by accessing the links
   in the Reference section of this Security Bulletin.

Disclaimer

   According to the Forum of Incident Response and Security Teams (FIRST),
   the Common Vulnerability Scoring System (CVSS) is an "industry open
   standard designed to convey vulnerability severity and help to determine
   urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS""
   WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF
   MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE
   RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY
   VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=lRpF
-----END PGP SIGNATURE-----