Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.4380 Security Bulletin: Vulnerabilities in Curl affect PowerSC (CVE-2019-5435, CVE-2019-5436) 19 November 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM PowerSC Publisher: IBM Operating System: AIX Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2019-5436 CVE-2019-5435 Reference: ESB-2019.2839 ESB-2019.2392 ESB-2019.1917 ESB-2019.1892 ESB-2019.1837 Original Bulletin: https://www.ibm.com/support/pages/node/1108041 - --------------------------BEGIN INCLUDED TEXT-------------------- Vulnerabilities in Curl affect PowerSC (CVE-2019-5435, CVE-2019-5436) Security Bulletin Summary There are vulnerabilities in Curl that affect PowerSC. Vulnerability Details CVEID: CVE-2019-5435 DESCRIPTION: An integer overflow in curl's URL API results in a buffer overflow in libcurl 7.62.0 to and including 7.64.1. CVSS Base score: 7.3 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 161429 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) CVEID: CVE-2019-5436 DESCRIPTION: A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1. CVSS Base score: 6.3 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 161431 for the current score. CVSS Vector: (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) Affected Products and Versions +--------------------+----------+ |Affected Product(s) |Version(s)| +--------------------+----------+ |PowerSC |1.2 | +--------------------+----------+ The following fileset levels are vulnerable: Fileset Lower Level Upper Level powerscStd.tnc_pm 1.2.0.0 1.2.0.3 curl-7.65.1-1.aix6.1.ppc.rpm 7.19.4 7.64.1 Note: To find out whether the affected PowerSC filesets are installed on your systems, refer to the lslpp command found in AIX user's guide. Example: rpm -qa | grep curl Remediation/Fixes A. FIXES Fixes are available. The fixes can be downloaded via ftp or http from: ftp://aix.software.ibm.com/aix/efixes/powersc/security/curl_fix.tar http://aix.software.ibm.com/aix/efixes/powersc/security/curl_fix.tar https://aix.software.ibm.com/aix/efixes/powersc/security/curl_fix.tar The link above is a tar file containing this signedadvisory, open source fix packages, and OpenSSL signatures for eachpackage. To extract the fixes from the tar file: tar xvf curl_fix.tar cd curl_fix Verify you have retrieved the fixes intact: The checksums below were generated using the"openssl dgst -sha256 [filename]" command as the following: openssl dgst -sha256 filename KEY - ----------------------------------------------------------------------------------------------------------------------- 56e394405836f1bdf7d188cef30adf5f6151fe594b39576dfbd953435e192569 ca-certificates-2016.10.7-2.aix6.1.ppc.rpm key_w_csum 5f01da544ae221c3f98ecd864782597b326f7838bb759cbb44b8366cad2eaeee curl-7.65.1-1.aix6.1.ppc.rpm key_w_csum 3ef01f3aea3e62ce402158ea892dfdb101d2c2f1c06256c6a245dc3126610bc0 db-6.2.32-2.aix6.1.ppc.rpm key_w_csum 7d1b39e1b8ab29a33edf9bb8fb589e071a6e0e06b69182f8a08776f497715f49 krb5-libs-1.16.1-2.aix6.1.ppc.rpm key_w_csum dfd52c9b162b075abdaea908910ade3ee13d923e36a7e45cf6e1308ef5e62b52 libgcc-8.1.0-2.aix7.2.ppc.rpm key_w_csum These sums should match exactly. The OpenSSL signatures in the tarfile and on this advisory can also be used to verify theintegrity of the fixes. If the sums or signatures cannot beconfirmed, contact IBM Support. openssl dgst -sha1 -verify <pubkey_file> -signature <advisory_file>.sig <advisory_file> openssl dgst -sha1 -verify <pubkey_file> -signature <ifix_file>.sig <ifix_file> Published advisory OpenSSL signature file location: http://aix.software.ibm.com/aix/efixes/powersc/security/curl_advisory.asc.sig https://aix.software.ibm.com/aix/efixes/powersc/security/curl_advisory.asc.sig ftp://aix.software.ibm.com/aix/efixes/powersc/security/curl_advisory.as... B. FIX AND INTERIM FIX INSTALLATION IMPORTANT: If possible, it is recommended that a mksysb backupof the system be created. Verify it is both bootable andreadable before proceeding. To extract the fixes from the tar file: tar xvf curl_fix.tar cd curl_fix To install a fix package: rpm -ivh *.rpm rpm -Uvh *.rpm Interim fixes have had limited functional and regressiontesting but not the full regression testing that takes placefor Service Packs; however, IBM does fully support them. Workarounds and Mitigations None. Get Notified about Future Security Bulletins References - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXdOIeGaOgq3Tt24GAQhdjBAAve+mrRdS4LlN7Ucg4wgZWVVk9LkOEdR3 JJYfaz2R0QPkxDJMbwYWb1TlbpACngJMizMAzedd/0Zxs2B6P2NMxf1fmtBxfjFf BC+xWtGCi8ayot2SozXXmkdCqxu7rtMGVvBQ5QQjMYSvuty4lw70+1ytwppaROIJ 8sgGjLHMkQgtdFufNseH7wUi9fQyPko4nFA88q0cn6tK8yTaHSLi0Fx+drOdSJr1 waq/23hIZRjC0of2ZP+UHV579Ie16D5GC3Mv1zWuAzO7fh+OUINGFhCkCti9lQNc 2oCdKZGceXmRqoX+ePTnkjHBl0s0frv39yCfneJcWtCIBeDf5eH89UyMZaGm4OZ3 57j9PJtmsaQtBsnZ1Tp9p2guwLBStFQKeNdBxZs6m6KQpZe4LMOAwHgFvFn4qam/ ATYbssIhrILjyMCHBwr/0eT9pvyR95ksM0JoSjzEGopWy8fko3OQQwtzancrjobz DDj+gC8g5NIS3y6D+VxS9LQrJbAXG55YQwI8RpU6sVTaolj1bT39WoTFg/XERmrR chWmH39K53VtfLW/7IdEtq8TVzczP/mxRimlBjmpCMSgvZYxIInwC/HqjEBFFz8E Y7QRiDhwI5VoL0G6p/fSrRDG0RxfhvCHa7zpqG23NE+kci2hxqm5BndGQUq3bDsg jzy2tkQq138= =i29h -----END PGP SIGNATURE-----