-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.4380
         Security Bulletin: Vulnerabilities in Curl affect PowerSC
                      (CVE-2019-5435, CVE-2019-5436)
                             19 November 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM PowerSC
Publisher:         IBM
Operating System:  AIX
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-5436 CVE-2019-5435 

Reference:         ESB-2019.2839
                   ESB-2019.2392
                   ESB-2019.1917
                   ESB-2019.1892
                   ESB-2019.1837

Original Bulletin: 
   https://www.ibm.com/support/pages/node/1108041

- --------------------------BEGIN INCLUDED TEXT--------------------

Vulnerabilities in Curl affect PowerSC (CVE-2019-5435, CVE-2019-5436)

Security Bulletin

Summary

There are vulnerabilities in Curl that affect PowerSC.

Vulnerability Details

CVEID: CVE-2019-5435
DESCRIPTION: An integer overflow in curl's URL API results in a buffer overflow
in libcurl 7.62.0 to and including 7.64.1.
CVSS Base score: 7.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
161429 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

CVEID: CVE-2019-5436
DESCRIPTION: A heap buffer overflow in the TFTP receiving code allows for DoS
or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.
CVSS Base score: 6.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
161431 for the current score.
CVSS Vector: (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

Affected Products and Versions

+--------------------+----------+
|Affected Product(s) |Version(s)|
+--------------------+----------+
|PowerSC             |1.2       |
+--------------------+----------+

The following fileset levels are vulnerable:

Fileset                                Lower Level     Upper Level
powerscStd.tnc_pm                      1.2.0.0         1.2.0.3
curl-7.65.1-1.aix6.1.ppc.rpm           7.19.4          7.64.1

Note: To find out whether the affected PowerSC filesets are installed on your
systems, refer to the lslpp command found in AIX user's guide.

Example: rpm -qa | grep curl

Remediation/Fixes

A. FIXES

Fixes are available.

The fixes can be downloaded via ftp or http from:

ftp://aix.software.ibm.com/aix/efixes/powersc/security/curl_fix.tar
http://aix.software.ibm.com/aix/efixes/powersc/security/curl_fix.tar
https://aix.software.ibm.com/aix/efixes/powersc/security/curl_fix.tar

The link above is a tar file containing this signedadvisory, open source fix
packages, and OpenSSL signatures for eachpackage.

To extract the fixes from the tar file:

tar xvf curl_fix.tar

cd curl_fix

Verify you have retrieved the fixes intact:

The checksums below were generated using the"openssl dgst -sha256 [filename]"
command as the following:

openssl dgst -sha256 filename KEY
- -----------------------------------------------------------------------------------------------------------------------

56e394405836f1bdf7d188cef30adf5f6151fe594b39576dfbd953435e192569
ca-certificates-2016.10.7-2.aix6.1.ppc.rpm key_w_csum
5f01da544ae221c3f98ecd864782597b326f7838bb759cbb44b8366cad2eaeee
curl-7.65.1-1.aix6.1.ppc.rpm key_w_csum
3ef01f3aea3e62ce402158ea892dfdb101d2c2f1c06256c6a245dc3126610bc0
db-6.2.32-2.aix6.1.ppc.rpm key_w_csum
7d1b39e1b8ab29a33edf9bb8fb589e071a6e0e06b69182f8a08776f497715f49
krb5-libs-1.16.1-2.aix6.1.ppc.rpm key_w_csum
dfd52c9b162b075abdaea908910ade3ee13d923e36a7e45cf6e1308ef5e62b52
libgcc-8.1.0-2.aix7.2.ppc.rpm key_w_csum

These sums should match exactly. The OpenSSL signatures in the tarfile and on
this advisory can also be used to verify theintegrity of the fixes. If the sums
or signatures cannot beconfirmed, contact IBM Support.

openssl dgst -sha1 -verify <pubkey_file> -signature <advisory_file>.sig
<advisory_file>

openssl dgst -sha1 -verify <pubkey_file> -signature <ifix_file>.sig <ifix_file>

Published advisory OpenSSL signature file location:

http://aix.software.ibm.com/aix/efixes/powersc/security/curl_advisory.asc.sig
https://aix.software.ibm.com/aix/efixes/powersc/security/curl_advisory.asc.sig
ftp://aix.software.ibm.com/aix/efixes/powersc/security/curl_advisory.as...

B. FIX AND INTERIM FIX INSTALLATION

IMPORTANT: If possible, it is recommended that a mksysb backupof the system be
created. Verify it is both bootable andreadable before proceeding.

To extract the fixes from the tar file:

tar xvf curl_fix.tar
cd curl_fix

To install a fix package:

rpm -ivh *.rpm
rpm -Uvh *.rpm

Interim fixes have had limited functional and regressiontesting but not the
full regression testing that takes placefor Service Packs; however, IBM does
fully support them.

Workarounds and Mitigations

None.

Get Notified about Future Security Bulletins

References

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=i29h
-----END PGP SIGNATURE-----