-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.4324
       Security Bulletin: Security vulnerabilities affect IBM Cloud
             Object Storage SDK Java (November 2019 Bulletin)
                             15 November 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Cloud Object Storage SDK Java
Publisher:         IBM
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
                   Virtualisation
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Access Confidential Data        -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-17267 CVE-2019-16943 CVE-2019-16942
                   CVE-2019-16335 CVE-2019-14540 

Reference:         ESB-2019.3949
                   ESB-2019.3734
                   ESB-2019.3722

Original Bulletin: 
   https://www.ibm.com/support/pages/node/1105671

- --------------------------BEGIN INCLUDED TEXT--------------------

Security vulnerabilities affect IBM Cloud Object Storage SDK Java (November
2019 Bulletin)

Security Bulletin

Summary

Security vulnerabilities affect IBM Cloud Object Storage SDK Java. These
vulnerabilities have been addressed in the latest SDK 2.5.5 release.

Vulnerability Details

CVEID: CVE-2019-16335
DESCRIPTION: A Polymorphic Typing issue was discovered in FasterXML
jackson-databind before 2.9.10. It is related to
com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than
CVE-2019-14540.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
167205 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2019-17267
DESCRIPTION: A Polymorphic Typing issue was discovered in FasterXML
jackson-databind before 2.9.10. It is related to
net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup.
CVSS Base score: 7.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
168514 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

CVEID: CVE-2019-16943
DESCRIPTION: A Polymorphic Typing issue was discovered in FasterXML
jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either
globally or for a specific property) for an externally exposed JSON endpoint
and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can
find an RMI service endpoint to access, it is possible to make the service
execute a malicious payload. This issue exists because of
com.p6spy.engine.spy.P6DataSource mishandling.
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
168255 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID: CVE-2019-16942
DESCRIPTION: A Polymorphic Typing issue was discovered in FasterXML
jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either
globally or for a specific property) for an externally exposed JSON endpoint
and the service has the commons-dbcp (1.4) jar in the classpath, and an
attacker can find an RMI service endpoint to access, it is possible to make the
service execute a malicious payload. This issue exists because of
org.apache.commons.dbcp.datasources.SharedPoolDataSource and
org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling.
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
168254 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID: CVE-2019-14540
DESCRIPTION: FasterXML jackson-databind could allow a remote attacker to obtain
sensitive information, caused by a polymorphic typing issue in
com.zaxxer.hikari.HikariConfig. A remote attacker could exploit this
vulnerability to obtain sensitive information.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
167354 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

+-------------------+--------------+
|Affected Product(s)|Version(s)    |
+-------------------+--------------+
|COS SDK Java       |Prior to 2.5.5|
+-------------------+--------------+

Remediation/Fixes

IBM COS SDK Releases
+--------------------+--------------------------------------------------+
|IBM COS SDK Releases|Link to Fix / Fix Availability Target             |
+--------------------+--------------------------------------------------+
|COS SDK Java 2.5.5  |https://github.com/IBM/ibm-cos-sdk-java/tree/2.5.5|
+--------------------+--------------------------------------------------+

Workarounds and Mitigations

IBM COS SDK Releases
+--------------------+--------------------------------------------------+
|IBM COS SDK Releases|Link to Fix / Fix Availability Target             |
+--------------------+--------------------------------------------------+
|COS SDK Java 2.5.5  |https://github.com/IBM/ibm-cos-sdk-java/tree/2.5.5|
+--------------------+--------------------------------------------------+

Get Notified about Future Security Bulletins

References

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXc4dw2aOgq3Tt24GAQiN0A//TTTPN0FB7j/I4iv5KryySWDN/OZSPnSZ
MJ7/xEQnJ4AgQ04dCrRR45HEHpgN3DNTZT7kDrlQCvngmHf5532bBVGhshebMeTQ
/PxFA3+EjwEAXlZ7n6q0n/lzOAdVD70OI1Sx1UWVLtGXOykEwBnW6D6UjcClchgH
L+J1wWTXL5535Eax9kzC+baTF3XvWRGqG7PLwCSQNUEKrqPP2CjPwfzEA6yPSKDb
GccyocaqKwl7dcaSHIEWBXuzQptMSZt7SeNMtok8B8PZapKNFNkLu+amsE/RvvBF
yaIve60AGJGhpoExQmKLQFE2E3OKu/8l2VYpnmNW+TSW15UmU5J25DW070iO/bTQ
I/oIMyA+N0/p//6hUargUc+4daqzWL0gAR1A/ZA9EzlpjQUtwN2u5OTtk60HqnZq
OVWTED+iZiEiXGn0n+jw1utawsrUeEKxEIou2b8Jr5UhnzAw0gz4tLF144R1aYGC
O6Ip1RBBwiyhHTQSz7uiUoEP10tQ0OZlcMClqGbKL0lxSqUSn/OKHS15Q+s001aZ
Z9EfgUbJmUYNTkMKWySox6lqi6LT0eHU8Yhnn4xL/f8EES8r9SUd1OF0UZ8PfBCS
GIHqxqcCIJGZyzZV829aXVfv91tvxmeMRf6ZwqjQ237T9FxYcdj5qqCubSAdxvSE
jgvDUmLuEH0=
=oYLY
-----END PGP SIGNATURE-----