-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.4665
        Security Bulletin: Security vulnerability in IBM WebSphere
               Application Server affects IBM Voice Gateway
                             13 December 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM WebSphere Application Server
Publisher:         IBM
Operating System:  Windows
                   HP-UX
                   Solaris
                   Linux variants
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Increased Privileges            -- Existing Account      
                   Denial of Service               -- Remote/Unauthenticated
                   Cross-site Scripting            -- Existing Account      
                   Access Confidential Data        -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-17631 CVE-2019-9518 CVE-2019-9517
                   CVE-2019-9515 CVE-2019-9514 CVE-2019-9513
                   CVE-2019-9512 CVE-2019-4663 CVE-2019-4441
                   CVE-2019-4305 CVE-2019-2999 CVE-2019-2996
                   CVE-2019-2992 CVE-2019-2989 CVE-2019-2988
                   CVE-2019-2987 CVE-2019-2983 CVE-2019-2981
                   CVE-2019-2978 CVE-2019-2977 CVE-2019-2975
                   CVE-2019-2973 CVE-2019-2964 CVE-2019-2962
                   CVE-2019-2958 CVE-2019-2945 CVE-2019-2933
                   CVE-2019-2894 CVE-2018-1996 CVE-2015-7450

Reference:         ASB-2019.0294
                   ASB-2019.0290
                   ASB-2019.0286
                   ASB-2019.0238

Original Bulletin: 
   https://www.ibm.com/support/pages/node/1127367
   https://www.ibm.com/support/pages/node/1126887
   https://www.ibm.com/support/pages/node/1135210
   https://www.ibm.com/support/pages/node/1127853
   https://www.ibm.com/support/pages/node/1127589
   https://www.ibm.com/support/pages/node/1128543
   https://www.ibm.com/support/pages/node/1128321

Comment: This bulletin contains seven (7) IBM security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: WebSphere Application Server Liberty is vulnerable to
Cross-site Scripting (CVE-2019-4663)

Summary

There is a cross-site scripting vulnerability in the Admin Center. This has
been addressed.

Vulnerability Details

CVEID:   CVE-2019-4663
DESCRIPTION: IBM WebSphere Application Server - Liberty is vulnerable to
cross-site scripting. This vulnerability allows users to embed arbitrary
JavaScript code in the Web UI thus altering the intended functionality
potentially leading to credentials disclosure within a trusted session.
CVSS Base score: 5.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities
/171245 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

+------------------------------------+--------------------+
|Affected Product(s)                 |Version(s)          |
+------------------------------------+--------------------+
|WebSphere Application Server Liberty|17.0.0.3 - 19.0.0.11|
+------------------------------------+--------------------+

Remediation/Fixes

For WebSphere Application Server Liberty using adminCenter-1.0[]:

. Upgrade to minimal fix pack levels as required by interim fix and then apply
Interim Fix PH18799
- --OR--
. Apply Fix Pack 19.0.0.12 or later (targeted availability 4Q2019).

Workarounds and Mitigations

None

Change History

09 December 2019: Initial Publication

Document Information

Modified date:
11 December 2019

- -------------------------------------------------------------------------------

Security Bulletin: Multiple Vulnerabilities in IBM(R) Java SDK affect WebSphere
Application Server October 2019 CPU


Summary

There are multiple vulnerabilities in the IBM(R) SDK, Java(TM) Technology Edition
that is shipped with IBM WebSphere Application Server. These might affect some
configurations of IBM WebSphere Application Server Traditional, IBM WebSphere
Application Server Liberty and IBM WebSphere Application Server Hypervisor
Edition. These products have addressed the applicable CVEs. If you run your
own Java code using the IBM Java Runtime delivered with this product, you
should evaluate your code to determine whether the complete list of
vulnerabilities is applicable to your code. For a complete list of
vulnerabilities, refer to the link for "IBM Java SDK Security Bulletin" 1
located in the References section for more information. HP fixes are on a
delayed schedule.

Vulnerability Details

CVEID:   CVE-2019-2989
DESCRIPTION:   An unspecified vulnerability in Java SE could allow an
unauthenticated attacker to cause no confidentiality impact, high integrity
impact, and no availability impact.
CVSS Base score: 6.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities
/169295 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N)

Affected Products and Versions

IBM SDK, Java Technology Editions used with WebSphere Application Server
Liberty
IBM SDK, Java Technology Editions used with IBM WebSphere Application Server
Traditional Version 9.0.0.0 through 9.0.5.1, 8.5.0.0 through 8.5.5.16.
IBM SDK, Java Technology Editions shipped in Application Client for IBM
WebSphere Application Server Version 9.0.0.0 through 9.0.5.1, 8.5.0.0 through
8.5.5.16.

Remediation/Fixes

Download and apply the interim fix APARs below, for your appropriate release

For the IBM Java SDK updates:

For WebSphere Application Server Liberty:

  Upgrade to IBM SDK, Java Technology Edition Version 8 SR6, refer to IBM Java
SDKs for Liberty

For Version 9 WebSphere Application Server Traditional:

Update to the IBM SDK, Java Technology Edition, Version 8 Service Refresh 6 
using the instructions in the IBM Knowledge Center Installing and updating IBM
SDK, Java Technology Edition on distributed environments then use the IBM
Installation Manager to access the online product repositories to install the
SDK or use IBM Installation Manager and access the packages from Fixcentral.

For V8.5.0.0 through 8.5.5.16 WebSphere Application Server Traditional and
WebSphere Application Server Hypervisor Edition:

For the IBM SDK, Java Technology Version that you use, upgrade to the minimal
fix pack level of WebSphere Application Server as noted in the interim fix
below then apply the interim fixes:
 

For IBM SDK Java Technology Edition Version 7

  o Apply interim fix PH18485: Will upgrade you to IBM SDK, Java Technology
    Edition, Version 7 Service Refresh 10 Fix Pack 55

For IBM SDK Java Technology Edition Version 7R1

  o Apply interim fix PH18484: Will upgrade you to IBM SDK, Java Technology
    Edition, Version 7R1 Service Refresh 4 Fix Pack 55

For IBM SDK Java Technology Edition Version 8

  o Apply interim fix PH18481: Will upgrade you to IBM SDK, Java Technology
    Edition, Version 8 Service Refresh 6
  o For environments that have been upgraded to use the new default IBM SDK
    Version 8 bundled with WebSphere Application Server Fix Pack 8.5.5.11 or
    later: Apply interim fix PH18482: Will upgrade you to IBM SDK, Java
    Technology Edition, Version 8 Service Refresh 6

       OR

  o Apply IBM Java SDK shipped with WebSphere Application Server Fix pack 17
    (8.5.5.17) or later (targeted availability 1Q 2020).

For Application Client for WebSphere Application Server:

Follow instructions above for the WebSphere Application Server to download the
interim fix needed for your version of the Application Client.

Workarounds and Mitigations

None

Change History
09 Dec 2019: Initial Publication

Modified date:
11 December 2019

- -------------------------------------------------------------------------------


Security Bulletin: Multiple vulnerabilities have been identified in IBM
WebSphere Application Server shipped with IBM Digital Business Automation
Workflow family products (Java CPU October 2019)

Summary

WebSphere Application Server is shipped as a component of IBM Business
Automation Workflow, IBM Business Process Manager, WebSphere Enterprise
Service Bus, and WebSphere Lombardi Edition. WebSphere Application Server
Liberty is shipped as a component of the optional BPM component Process
Federation Server and User Management Service. Information about security
vulnerabilities affecting IBM WebSphere Application Server Traditional and IBM
WebSphere Application Server Liberty have been published in a security
bulletin.

Vulnerability Details

Please consult the security bulletin: Multiple Vulnerabilities in IBM(R) Java
SDK affect WebSphere Application Server October 2019 CPU for vulnerability
details and information about fixes.

Additionally,  IBM Business Automation Workflow, IBM Business Process Manager,
and WebSphere Enterprise Service Bus might be affected by the following
vulnerabilities:

CVEID:   CVE-2019-2981
DESCRIPTION:   An unspecified vulnerability in Java SE related to the JAXP
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities
/169287 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)
CVEID:   CVE-2019-2973
DESCRIPTION:   An unspecified vulnerability in Java SE related to the JAXP
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities
/169279 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

Affected Products and Versions

- - IBM Business Automation Workflow V18.0 through V19.0

- - IBM Business Process Manager V8.6

- - IBM Business Process Manager V8.5

- - IBM Business Process Manager V8.0 (and earlier unsupported releases)

- - WebSphere Enterprise Service Bus V7.5

- - WebSphere Enterprise Service Bus V7.0 (and earlier unsupported releases)

Note that Cumulative Fixes cannot automatically install interim fixes for the
base Application Server. It is important to follow the complete installation
instructions and manually ensure that recommended security fixes are
installed.

For earlier and unsupported versions of the products, IBM recommends upgrading
to a fixed, supported version of the product.

Change History

12 Dec 2019: Initial Publication

Document Information

Modified date:
12 December 2019


- -------------------------------------------------------------------------------

Security vulnerability in IBM WebSphere Application Server affects IBM Voice
Gateway

Security Bulletin

Summary

Security vulnerability in IBM WebSphere Application Server affects IBM Voice
Gateway

Vulnerability Details

CVEID: CVE-2019-4441
DESCRIPTION: IBM WebSphere Application Server 7.0, 8.0, 8.5, 9.0, and Liberty
could allow a remote attacker to obtain sensitive information when a stack
trace is returned in the browser. IBM X-Force ID: 163177.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
163177 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2019-4305
DESCRIPTION: IBM WebSphere Application Server Liberty could allow a remote
attacker to obtain sensitive information caused by the improper setting of a
cookie. IBM X-Force ID: 160951.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
160951 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2019-9518
DESCRIPTION: Some HTTP/2 implementations are vulnerable to a flood of empty
frames, potentially leading to a denial of service. The attacker sends a stream
of frames with an empty payload and without the end-of-stream flag. These
frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends
time processing each frame disproportionate to attack bandwidth. This can
consume excess CPU.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
164904 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2019-9517
DESCRIPTION: Some HTTP/2 implementations are vulnerable to unconstrained
interal data buffering, potentially leading to a denial of service. The
attacker opens the HTTP/2 window so the peer can send without constraint;
however, they leave the TCP window closed so the peer cannot actually write
(many of) the bytes on the wire. The attacker then sends a stream of requests
for a large response object. Depending on how the servers queue the responses,
this can consume excess memory, CPU, or both.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
165183 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2019-9515
DESCRIPTION: Some HTTP/2 implementations are vulnerable to a settings flood,
potentially leading to a denial of service. The attacker sends a stream of
SETTINGS frames to the peer. Since the RFC requires that the peer reply with
one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost
equivalent in behavior to a ping. Depending on how efficiently this data is
queued, this can consume excess CPU, memory, or both.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
165181 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2019-9514
DESCRIPTION: Some HTTP/2 implementations are vulnerable to a reset flood,
potentially leading to a denial of service. The attacker opens a number of
streams and sends an invalid request over each stream that should solicit a
stream of RST_STREAM frames from the peer. Depending on how the peer queues the
RST_STREAM frames, this can consume excess memory, CPU, or both.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
164640 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2019-9513
DESCRIPTION: Some HTTP/2 implementations are vulnerable to resource loops,
potentially leading to a denial of service. The attacker creates multiple
request streams and continually shuffles the priority of the streams in a way
that causes substantial churn to the priority tree. This can consume excess
CPU.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
164639 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2019-9512
DESCRIPTION: Some HTTP/2 implementations are vulnerable to ping floods,
potentially leading to a denial of service. The attacker sends continual pings
to an HTTP/2 peer, causing the peer to build an internal queue of responses.
Depending on how efficiently this data is queued, this can consume excess CPU,
memory, or both.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
164903 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

+-------------------+-----------+
|Affected Product(s)|Version(s) |
+-------------------+-----------+
|Voice Gateway      |1.0.2-1.0.3|
+-------------------+-----------+

Remediation/Fixes

Upgrade to IBM Voice Gateway 1.0.4.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- -------------------------------------------------------------------------------

IBM Integration Bus & IBM App Connect Enterprise are affected by a
Websphere Application Server Vulnerability (CVE-2018-1996)

Security Bulletin

Summary

IBM Integration Bus and IBM App Connect Enterprise are affected by a WebSphere
Application Server vulnerability which was reported and has been addressed.
Vulnerability details are listed below

Vulnerability Details

CVEID: CVE-2018-1996
DESCRIPTION: IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could
provide weaker than expected security, caused by the improper TLS
configuration. A remote attacker could exploit this vulnerability to obtain
sensitive information using man in the middle techniques. IBM X-Force ID:
154650.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
154650 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

IBM App Connect Enterprise V11.0.0.0 - V11.0.0.5

IBM Integration Bus V10.0.0.0 - V10.0.0.17

IBM Integration Bus V9.0.0.0 - V9.0.0.11

Remediation/Fixes

+-------------------+-----------------------+-------+-----------------------------------------------------------+
|Product            |VRMF                   |APAR   |Remediation/Fixes                                          |
+-------------------+-----------------------+-------+-----------------------------------------------------------+
|IBM App Connect    |V11.0.0.0-V11.0.0.6    |IT30353|The APAR is available in fix pack 11.0.0.6                 |
|                   |                       |       |IBM App Connect Enterprise Version V11 - Fix Pack 11.0.0.6 |
+-------------------+-----------------------+-------+-----------------------------------------------------------+
|IBM Integration Bus|V10.0.0.0 - V10.0.0.17 |IT30353|The APAR is available in fix pack 10.0.0.18                |
|                   |                       |       |IBM Integration Bus V10.0 - Fix Pack 10.0.0.18             |
+-------------------+-----------------------+-------+-----------------------------------------------------------+
|IBM Integration Bus|V9.0.0.0 - V9.0.0.11   |IT30353|Contact IBM support to request for Fix APAR                |
+-------------------+-----------------------+-------+-----------------------------------------------------------+
IBM Integration Bus v9 is no longer in full support;IBM recommends upgrading to
a fixed, supported version/release/platform of the product.

If you are a customer with extended support and require a fix, contact IBM
support

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References


- -------------------------------------------------------------------------------

Apache Commons Collections library in WebSphere Application Server Knowledge
Center is vulnerable in IBM Cloud (CVE-2015-7450)

Security Bulletin

Summary

The Knowledge Center Component used in Version 9 of the WebSphere Application
Server needs an updated Apache Commons Collections library.

Vulnerability Details

CVEID: CVE-2015-7450
DESCRIPTION: Serialized-object interfaces in certain IBM analytics, business
solutions, cognitive, IT infrastructure, and mobile and social products allow
remote attackers to execute arbitrary commands via a crafted serialized Java
object, related to the InvokerTransformer class in the Apache Commons
Collections library.
CVSS Base score: 9.8
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

This vulnerability affect the following versions and releases of WebSphere
Application Server and bundling products.

  o 9.0

Remediation/Fixes

To patch an existing service instance, refer to the IBM WebSphere Application
Server bulletin listed below

  o Apache Commons Collections library in WebSphere Application Server
    Knowledge Center is vulnerable (CVE-2015-7450)

Please see Updating your environment in the KnowlegeCenter for information on
applying service.

Alternatively, delete the vulnerable service instance and create a new
instance.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- -------------------------------------------------------------------------------

Multiple vulnerabilities in IBM Java SDK affects WebSphere Application Server
October 2019 CPU that is bundled with IBM WebSphere Application Server Patterns

Security Bulletin

Summary

There are multiple vulnerabilities in the IBM SDK Java Technology Edition that
is shipped with IBM WebSphere Application Server. These issues were disclosed
in the IBM Java SDK updates in October 2019.

Vulnerability Details

CVEID: CVE-2019-2989
DESCRIPTION: An unspecified vulnerability in Java SE could allow an
unauthenticated attacker to cause no confidentiality impact, high integrity
impact, and no availability impact.
CVSS Base score: 6.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169295 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N)

CVEID: CVE-2019-2958
DESCRIPTION: An unspecified vulnerability in Java SE related to the Libraries
component could allow an unauthenticated attacker to cause no confidentiality
impact, high integrity impact, and no availability impact.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169264 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)

CVEID: CVE-2019-2977
DESCRIPTION: An unspecified vulnerability in Java SE related to the VM
component could allow an unauthenticated attacker to cause low confidentiality
impact, no integrity impact, and low availability impact.
CVSS Base score: 4.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169283 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L)

CVEID: CVE-2019-2975
DESCRIPTION: An unspecified vulnerability in Java SE related to the Scripting
component could allow an unauthenticated attacker to cause no confidentiality
impact, low integrity impact, and low availability impact.
CVSS Base score: 4.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169281 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)

CVEID: CVE-2019-2999
DESCRIPTION: An unspecified vulnerability in Java SE related to the Javadoc
component could allow an unauthenticated attacker to cause low confidentiality
impact, low integrity impact, and no availability impact.
CVSS Base score: 4.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169305 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N)

CVEID: CVE-2019-2996
DESCRIPTION: An unspecified vulnerability in Java SE related to the Deployment
component could allow an unauthenticated attacker to cause low confidentiality
impact, low integrity impact, and no availability impact.
CVSS Base score: 4.2
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169302 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N)

CVEID: CVE-2019-2894
DESCRIPTION: An unspecified vulnerability in Java SE related to the Security
component could allow an unauthenticated attacker to obtain sensitive
information resulting in a low confidentiality impact using unknown attack
vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169207 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2019-2992
DESCRIPTION: An unspecified vulnerability in Java SE related to the 2D
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169298 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2988
DESCRIPTION: An unspecified vulnerability in Java SE related to the 2D
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169294 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2987
DESCRIPTION: An unspecified vulnerability in Java SE related to the 2D
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169293 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2983
DESCRIPTION: An unspecified vulnerability in Java SE related to the
Serialization component could allow an unauthenticated attacker to cause a
denial of service resulting in a low availability impact using unknown attack
vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169289 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2981
DESCRIPTION: An unspecified vulnerability in Java SE related to the JAXP
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169287 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2978
DESCRIPTION: An unspecified vulnerability in Java SE related to the Networking
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169284 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2973
DESCRIPTION: An unspecified vulnerability in Java SE related to the JAXP
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169279 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2962
DESCRIPTION: An unspecified vulnerability in Java SE related to the 2D
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169268 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2964
DESCRIPTION: An unspecified vulnerability in Java SE related to the Concurrency
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169270 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2945
DESCRIPTION: An unspecified vulnerability in Java SE related to the Networking
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169250 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2933
DESCRIPTION: An unspecified vulnerability in Java SE related to the Libraries
component could allow an unauthenticated attacker to obtain sensitive
information resulting in a low confidentiality impact using unknown attack
vectors.
CVSS Base score: 3.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169238 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N)

CVEID: CVE-2019-17631
DESCRIPTION: Eclipse OpenJ9 could allow a local attacker to gain elevated
privileges on the system, caused by the failure to performs an authorization
check when an actor attempts to access a resource or perform an action. An
attacker could exploit this vulnerability to gain access to diagnostic
operations such as causing a GC or creating a diagnostic file.
CVSS Base score: 8.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169513 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

IBM Java SDK shipped with IBM WebSphere Application Server Patterns 1.0.0.0
through 1.0.0.7 and 2.2.0.0 through 2.3.1.0.

Remediation/Fixes

Please see the IBM Java SDK Security Bulletin for WebSphere Application Server 
to determine which WebSphere Application Server versions are affected and to
obtain the JDK fixes. The interim fix 1.0.0.0-WS-WASPATTERNS-JDK-1910 can be
used to apply the October SDK iFixes in a PureApplication Environment.

Download and apply the interim fix 1.0.0.0-WS-WASPATTERNS-JDK-1910.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=FDv0
-----END PGP SIGNATURE-----