-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.4415
Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM
 Spectrum Protect Operations Center on AIX (CVE-2019-4473, CVE-2019-11771)
                             21 November 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Spectrum Protect
Publisher:         IBM
Operating System:  AIX
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Increased Privileges            -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-11771 CVE-2019-4473 

Original Bulletin: 
   https://www.ibm.com/support/pages/node/1109829

- --------------------------BEGIN INCLUDED TEXT--------------------

Multiple vulnerabilities in IBM Java Runtime affect IBM Spectrum Protect
Operations Center on AIX (CVE-2019-4473, CVE-2019-11771)

Security Bulletin

Summary

There are multiple vulnerabilities in IBM Runtime Environment Java which is
used by IBM Spectrum Protect (formerly Tivoli Storage Manager) Operations
Center on AIX. These issues were disclosed as part of the IBM Java SDK updates
in July 2019.

Vulnerability Details

CVEID: CVE-2019-4473
DESCRIPTION: Multiple binaries in IBM SDK, Java Technology Edition 7, 7R, and 8
on the AIX platform use insecure absolute RPATHs, which may facilitate code
injection and privilege elevation by local users. IBM X-Force ID: 163984.
CVSS Base score: 8.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
163984 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID: CVE-2019-11771
DESCRIPTION: AIX builds of Eclipse OpenJ9 before 0.15.0 contain unused RPATHs
which may facilitate code injection and privilege elevation by local users.
CVSS Base score: 8.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
163989 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

+-----------------------------------------------------------------+-------------------+
|Affected Product(s)                                              |Version(s)         |
+-----------------------------------------------------------------+-------------------+
|IBM Spectrum Protect (formerly Tivoli Storage Manager) Operations|8.1.0.000-8.1.8.000|
|Center on AIX                                                    |                   |
+-----------------------------------------------------------------+-------------------+

Remediation/Fixes

+---------------+-----------+--------+------------------------------------------------------------------------------+
|Spectrum       |           |        |                                                                              |
|Protect        |First      |        |                                                                              |
|Operations     |Fixing     |Platform|Link to Fix                                                                   |
|Center         |VRM Level  |        |                                                                              |
|Release        |           |        |                                                                              |
+---------------+-----------+--------+------------------------------------------------------------------------------+
|8.1            |8.1.8.100  |AIX     |https://public.dhe.ibm.com/storage/tivoli-storage-management/patches/opcenter/|
|               |           |        |8.1.8.100                                                                     |
+---------------+-----------+--------+------------------------------------------------------------------------------+

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=TRgj
-----END PGP SIGNATURE-----