-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.4323
Security Bulletin: Multiple vulnerabilities in jackson-databind affect IBM
                Platform Symphony and IBM Spectrum Symphony
                             15 November 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Platform Symphony
                   IBM Spectrum Symphony
Publisher:         IBM
Operating System:  Linux variants
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Access Confidential Data        -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-16335 CVE-2019-14540 CVE-2019-14439
                   CVE-2019-14379  

Reference:         ASB-2019.0287
                   ESB-2019.3836
                   ESB-2019.3805
                   ESB-2019.3722
                   ESB-2019.3643.2

Original Bulletin: 
   https://www.ibm.com/support/pages/node/1106763

- --------------------------BEGIN INCLUDED TEXT--------------------

Multiple vulnerabilities in jackson-databind affect IBM Platform Symphony and
IBM Spectrum Symphony

Security Bulletin

Summary

Multiple vulnerabilities exist in the Jackson databind, core, and annotations
version used by IBM Spectrum Symphony V7.2.1, V7.2.0.2, and V7.1.2, and IBM
Platform Symphony V7.1.1 and V7.1 Fix Pack 1. Interim fixes that provide
instructions on upgrading the Jackson databind, core, and annotations package
to version 2.9.10 (which resolves these vulnerabilities) are available on IBM
Fix Central.

Vulnerability Details

CVEID: CVE-2019-16335
DESCRIPTION: A Polymorphic Typing issue was discovered in FasterXML
jackson-databind before 2.9.10. It is related to
com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than
CVE-2019-14540.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
167205 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
CVEID: CVE-2019-14379
DESCRIPTION: SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2
mishandles default typing when ehcache is used (because of
net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to
remote code execution.
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
165286 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVEID: CVE-2019-14439
DESCRIPTION: A Polymorphic Typing issue was discovered in FasterXML
jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled
(either globally or for a specific property) for an externally exposed JSON
endpoint and the service has the logback jar in the classpath.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
164744 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

+---------------------+--------------+
|IBM Spectrum Symphony|7.2.1         |
+---------------------+--------------+
|IBM Spectrum Symphony|7.2.0.2       |
+---------------------+--------------+
|IBM Spectrum Symphony|7.1.2         |
+---------------------+--------------+
|IBM Platform Symphony|7.1.1         |
+---------------------+--------------+
|IBM Platform Symphony|7.1 Fix Pack 1|
+---------------------+--------------+

Remediation/Fixes

Download the interim fixes that correspond to your product version from IBM Fix
Central, then follow the steps in the accompanying readme to apply the interim
fix on Linux x86_64 hosts in your cluster:
+--------------------------------------------+--------------------------------------------+
|IBM Spectrum Symphony 7.2.1                 |sym-7.2.1-build531757                       |
+--------------------------------------------+--------------------------------------------+
|IBM Spectrum Symphony 7.2.0.2               |sym-7.2.0.2-build531756                     |
+--------------------------------------------+--------------------------------------------+
|IBM Spectrum Symphony 7.1.2                 |sym-7.1.2-build531754                       |
+--------------------------------------------+--------------------------------------------+
|IBM Platform Symphony 7.1.1                 |sym-7.1.1-build531752                       |
+--------------------------------------------+--------------------------------------------+
|IBM Platform Symphony 7.1 Fix Pack 1        |sym-7.1-build531748                         |
+--------------------------------------------+--------------------------------------------+

Workarounds and Mitigations

None.

Get Notified about Future Security Bulletins

References

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=LQby
-----END PGP SIGNATURE-----