Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.4665 Security Bulletin: Security vulnerability in IBM WebSphere Application Server affects IBM Voice Gateway 13 December 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM WebSphere Application Server Publisher: IBM Operating System: Windows HP-UX Solaris Linux variants Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Increased Privileges -- Existing Account Denial of Service -- Remote/Unauthenticated Cross-site Scripting -- Existing Account Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-17631 CVE-2019-9518 CVE-2019-9517 CVE-2019-9515 CVE-2019-9514 CVE-2019-9513 CVE-2019-9512 CVE-2019-4663 CVE-2019-4441 CVE-2019-4305 CVE-2019-2999 CVE-2019-2996 CVE-2019-2992 CVE-2019-2989 CVE-2019-2988 CVE-2019-2987 CVE-2019-2983 CVE-2019-2981 CVE-2019-2978 CVE-2019-2977 CVE-2019-2975 CVE-2019-2973 CVE-2019-2964 CVE-2019-2962 CVE-2019-2958 CVE-2019-2945 CVE-2019-2933 CVE-2019-2894 CVE-2018-1996 CVE-2015-7450 Reference: ASB-2019.0294 ASB-2019.0290 ASB-2019.0286 ASB-2019.0238 Original Bulletin: https://www.ibm.com/support/pages/node/1127367 https://www.ibm.com/support/pages/node/1126887 https://www.ibm.com/support/pages/node/1135210 https://www.ibm.com/support/pages/node/1127853 https://www.ibm.com/support/pages/node/1127589 https://www.ibm.com/support/pages/node/1128543 https://www.ibm.com/support/pages/node/1128321 Comment: This bulletin contains seven (7) IBM security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- Security Bulletin: WebSphere Application Server Liberty is vulnerable to Cross-site Scripting (CVE-2019-4663) Summary There is a cross-site scripting vulnerability in the Admin Center. This has been addressed. Vulnerability Details CVEID: CVE-2019-4663 DESCRIPTION: IBM WebSphere Application Server - Liberty is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. CVSS Base score: 5.4 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities /171245 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) Affected Products and Versions +------------------------------------+--------------------+ |Affected Product(s) |Version(s) | +------------------------------------+--------------------+ |WebSphere Application Server Liberty|17.0.0.3 - 19.0.0.11| +------------------------------------+--------------------+ Remediation/Fixes For WebSphere Application Server Liberty using adminCenter-1.0[]: . Upgrade to minimal fix pack levels as required by interim fix and then apply Interim Fix PH18799 - --OR-- . Apply Fix Pack 19.0.0.12 or later (targeted availability 4Q2019). Workarounds and Mitigations None Change History 09 December 2019: Initial Publication Document Information Modified date: 11 December 2019 - ------------------------------------------------------------------------------- Security Bulletin: Multiple Vulnerabilities in IBM(R) Java SDK affect WebSphere Application Server October 2019 CPU Summary There are multiple vulnerabilities in the IBM(R) SDK, Java(TM) Technology Edition that is shipped with IBM WebSphere Application Server. These might affect some configurations of IBM WebSphere Application Server Traditional, IBM WebSphere Application Server Liberty and IBM WebSphere Application Server Hypervisor Edition. These products have addressed the applicable CVEs. If you run your own Java code using the IBM Java Runtime delivered with this product, you should evaluate your code to determine whether the complete list of vulnerabilities is applicable to your code. For a complete list of vulnerabilities, refer to the link for "IBM Java SDK Security Bulletin" 1 located in the References section for more information. HP fixes are on a delayed schedule. Vulnerability Details CVEID: CVE-2019-2989 DESCRIPTION: An unspecified vulnerability in Java SE could allow an unauthenticated attacker to cause no confidentiality impact, high integrity impact, and no availability impact. CVSS Base score: 6.8 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities /169295 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N) Affected Products and Versions IBM SDK, Java Technology Editions used with WebSphere Application Server Liberty IBM SDK, Java Technology Editions used with IBM WebSphere Application Server Traditional Version 9.0.0.0 through 9.0.5.1, 8.5.0.0 through 8.5.5.16. IBM SDK, Java Technology Editions shipped in Application Client for IBM WebSphere Application Server Version 9.0.0.0 through 9.0.5.1, 8.5.0.0 through 8.5.5.16. Remediation/Fixes Download and apply the interim fix APARs below, for your appropriate release For the IBM Java SDK updates: For WebSphere Application Server Liberty: Upgrade to IBM SDK, Java Technology Edition Version 8 SR6, refer to IBM Java SDKs for Liberty For Version 9 WebSphere Application Server Traditional: Update to the IBM SDK, Java Technology Edition, Version 8 Service Refresh 6 using the instructions in the IBM Knowledge Center Installing and updating IBM SDK, Java Technology Edition on distributed environments then use the IBM Installation Manager to access the online product repositories to install the SDK or use IBM Installation Manager and access the packages from Fixcentral. For V8.5.0.0 through 8.5.5.16 WebSphere Application Server Traditional and WebSphere Application Server Hypervisor Edition: For the IBM SDK, Java Technology Version that you use, upgrade to the minimal fix pack level of WebSphere Application Server as noted in the interim fix below then apply the interim fixes: For IBM SDK Java Technology Edition Version 7 o Apply interim fix PH18485: Will upgrade you to IBM SDK, Java Technology Edition, Version 7 Service Refresh 10 Fix Pack 55 For IBM SDK Java Technology Edition Version 7R1 o Apply interim fix PH18484: Will upgrade you to IBM SDK, Java Technology Edition, Version 7R1 Service Refresh 4 Fix Pack 55 For IBM SDK Java Technology Edition Version 8 o Apply interim fix PH18481: Will upgrade you to IBM SDK, Java Technology Edition, Version 8 Service Refresh 6 o For environments that have been upgraded to use the new default IBM SDK Version 8 bundled with WebSphere Application Server Fix Pack 8.5.5.11 or later: Apply interim fix PH18482: Will upgrade you to IBM SDK, Java Technology Edition, Version 8 Service Refresh 6 OR o Apply IBM Java SDK shipped with WebSphere Application Server Fix pack 17 (8.5.5.17) or later (targeted availability 1Q 2020). For Application Client for WebSphere Application Server: Follow instructions above for the WebSphere Application Server to download the interim fix needed for your version of the Application Client. Workarounds and Mitigations None Change History 09 Dec 2019: Initial Publication Modified date: 11 December 2019 - ------------------------------------------------------------------------------- Security Bulletin: Multiple vulnerabilities have been identified in IBM WebSphere Application Server shipped with IBM Digital Business Automation Workflow family products (Java CPU October 2019) Summary WebSphere Application Server is shipped as a component of IBM Business Automation Workflow, IBM Business Process Manager, WebSphere Enterprise Service Bus, and WebSphere Lombardi Edition. WebSphere Application Server Liberty is shipped as a component of the optional BPM component Process Federation Server and User Management Service. Information about security vulnerabilities affecting IBM WebSphere Application Server Traditional and IBM WebSphere Application Server Liberty have been published in a security bulletin. Vulnerability Details Please consult the security bulletin: Multiple Vulnerabilities in IBM(R) Java SDK affect WebSphere Application Server October 2019 CPU for vulnerability details and information about fixes. Additionally, IBM Business Automation Workflow, IBM Business Process Manager, and WebSphere Enterprise Service Bus might be affected by the following vulnerabilities: CVEID: CVE-2019-2981 DESCRIPTION: An unspecified vulnerability in Java SE related to the JAXP component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base score: 3.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities /169287 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) CVEID: CVE-2019-2973 DESCRIPTION: An unspecified vulnerability in Java SE related to the JAXP component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base score: 3.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities /169279 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) Affected Products and Versions - - IBM Business Automation Workflow V18.0 through V19.0 - - IBM Business Process Manager V8.6 - - IBM Business Process Manager V8.5 - - IBM Business Process Manager V8.0 (and earlier unsupported releases) - - WebSphere Enterprise Service Bus V7.5 - - WebSphere Enterprise Service Bus V7.0 (and earlier unsupported releases) Note that Cumulative Fixes cannot automatically install interim fixes for the base Application Server. It is important to follow the complete installation instructions and manually ensure that recommended security fixes are installed. For earlier and unsupported versions of the products, IBM recommends upgrading to a fixed, supported version of the product. Change History 12 Dec 2019: Initial Publication Document Information Modified date: 12 December 2019 - ------------------------------------------------------------------------------- Security vulnerability in IBM WebSphere Application Server affects IBM Voice Gateway Security Bulletin Summary Security vulnerability in IBM WebSphere Application Server affects IBM Voice Gateway Vulnerability Details CVEID: CVE-2019-4441 DESCRIPTION: IBM WebSphere Application Server 7.0, 8.0, 8.5, 9.0, and Liberty could allow a remote attacker to obtain sensitive information when a stack trace is returned in the browser. IBM X-Force ID: 163177. CVSS Base score: 5.3 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 163177 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) CVEID: CVE-2019-4305 DESCRIPTION: IBM WebSphere Application Server Liberty could allow a remote attacker to obtain sensitive information caused by the improper setting of a cookie. IBM X-Force ID: 160951. CVSS Base score: 5.3 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 160951 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) CVEID: CVE-2019-9518 DESCRIPTION: Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU. CVSS Base score: 7.5 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 164904 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVEID: CVE-2019-9517 DESCRIPTION: Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both. CVSS Base score: 7.5 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 165183 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVEID: CVE-2019-9515 DESCRIPTION: Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both. CVSS Base score: 7.5 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 165181 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVEID: CVE-2019-9514 DESCRIPTION: Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both. CVSS Base score: 7.5 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 164640 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVEID: CVE-2019-9513 DESCRIPTION: Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU. CVSS Base score: 7.5 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 164639 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVEID: CVE-2019-9512 DESCRIPTION: Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both. CVSS Base score: 7.5 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 164903 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) Affected Products and Versions +-------------------+-----------+ |Affected Product(s)|Version(s) | +-------------------+-----------+ |Voice Gateway |1.0.2-1.0.3| +-------------------+-----------+ Remediation/Fixes Upgrade to IBM Voice Gateway 1.0.4. Workarounds and Mitigations None Get Notified about Future Security Bulletins References - ------------------------------------------------------------------------------- IBM Integration Bus & IBM App Connect Enterprise are affected by a Websphere Application Server Vulnerability (CVE-2018-1996) Security Bulletin Summary IBM Integration Bus and IBM App Connect Enterprise are affected by a WebSphere Application Server vulnerability which was reported and has been addressed. Vulnerability details are listed below Vulnerability Details CVEID: CVE-2018-1996 DESCRIPTION: IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could provide weaker than expected security, caused by the improper TLS configuration. A remote attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 154650. CVSS Base score: 5.3 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 154650 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) Affected Products and Versions IBM App Connect Enterprise V11.0.0.0 - V11.0.0.5 IBM Integration Bus V10.0.0.0 - V10.0.0.17 IBM Integration Bus V9.0.0.0 - V9.0.0.11 Remediation/Fixes +-------------------+-----------------------+-------+-----------------------------------------------------------+ |Product |VRMF |APAR |Remediation/Fixes | +-------------------+-----------------------+-------+-----------------------------------------------------------+ |IBM App Connect |V11.0.0.0-V11.0.0.6 |IT30353|The APAR is available in fix pack 11.0.0.6 | | | | |IBM App Connect Enterprise Version V11 - Fix Pack 11.0.0.6 | +-------------------+-----------------------+-------+-----------------------------------------------------------+ |IBM Integration Bus|V10.0.0.0 - V10.0.0.17 |IT30353|The APAR is available in fix pack 10.0.0.18 | | | | |IBM Integration Bus V10.0 - Fix Pack 10.0.0.18 | +-------------------+-----------------------+-------+-----------------------------------------------------------+ |IBM Integration Bus|V9.0.0.0 - V9.0.0.11 |IT30353|Contact IBM support to request for Fix APAR | +-------------------+-----------------------+-------+-----------------------------------------------------------+ IBM Integration Bus v9 is no longer in full support;IBM recommends upgrading to a fixed, supported version/release/platform of the product. If you are a customer with extended support and require a fix, contact IBM support Workarounds and Mitigations None Get Notified about Future Security Bulletins References - ------------------------------------------------------------------------------- Apache Commons Collections library in WebSphere Application Server Knowledge Center is vulnerable in IBM Cloud (CVE-2015-7450) Security Bulletin Summary The Knowledge Center Component used in Version 9 of the WebSphere Application Server needs an updated Apache Commons Collections library. Vulnerability Details CVEID: CVE-2015-7450 DESCRIPTION: Serialized-object interfaces in certain IBM analytics, business solutions, cognitive, IT infrastructure, and mobile and social products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the InvokerTransformer class in the Apache Commons Collections library. CVSS Base score: 9.8 CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) Affected Products and Versions This vulnerability affect the following versions and releases of WebSphere Application Server and bundling products. o 9.0 Remediation/Fixes To patch an existing service instance, refer to the IBM WebSphere Application Server bulletin listed below o Apache Commons Collections library in WebSphere Application Server Knowledge Center is vulnerable (CVE-2015-7450) Please see Updating your environment in the KnowlegeCenter for information on applying service. Alternatively, delete the vulnerable service instance and create a new instance. Workarounds and Mitigations None Get Notified about Future Security Bulletins References - ------------------------------------------------------------------------------- Multiple vulnerabilities in IBM Java SDK affects WebSphere Application Server October 2019 CPU that is bundled with IBM WebSphere Application Server Patterns Security Bulletin Summary There are multiple vulnerabilities in the IBM SDK Java Technology Edition that is shipped with IBM WebSphere Application Server. These issues were disclosed in the IBM Java SDK updates in October 2019. Vulnerability Details CVEID: CVE-2019-2989 DESCRIPTION: An unspecified vulnerability in Java SE could allow an unauthenticated attacker to cause no confidentiality impact, high integrity impact, and no availability impact. CVSS Base score: 6.8 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169295 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N) CVEID: CVE-2019-2958 DESCRIPTION: An unspecified vulnerability in Java SE related to the Libraries component could allow an unauthenticated attacker to cause no confidentiality impact, high integrity impact, and no availability impact. CVSS Base score: 5.9 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169264 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N) CVEID: CVE-2019-2977 DESCRIPTION: An unspecified vulnerability in Java SE related to the VM component could allow an unauthenticated attacker to cause low confidentiality impact, no integrity impact, and low availability impact. CVSS Base score: 4.8 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169283 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L) CVEID: CVE-2019-2975 DESCRIPTION: An unspecified vulnerability in Java SE related to the Scripting component could allow an unauthenticated attacker to cause no confidentiality impact, low integrity impact, and low availability impact. CVSS Base score: 4.8 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169281 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L) CVEID: CVE-2019-2999 DESCRIPTION: An unspecified vulnerability in Java SE related to the Javadoc component could allow an unauthenticated attacker to cause low confidentiality impact, low integrity impact, and no availability impact. CVSS Base score: 4.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169305 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N) CVEID: CVE-2019-2996 DESCRIPTION: An unspecified vulnerability in Java SE related to the Deployment component could allow an unauthenticated attacker to cause low confidentiality impact, low integrity impact, and no availability impact. CVSS Base score: 4.2 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169302 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N) CVEID: CVE-2019-2894 DESCRIPTION: An unspecified vulnerability in Java SE related to the Security component could allow an unauthenticated attacker to obtain sensitive information resulting in a low confidentiality impact using unknown attack vectors. CVSS Base score: 3.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169207 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N) CVEID: CVE-2019-2992 DESCRIPTION: An unspecified vulnerability in Java SE related to the 2D component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base score: 3.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169298 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) CVEID: CVE-2019-2988 DESCRIPTION: An unspecified vulnerability in Java SE related to the 2D component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base score: 3.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169294 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) CVEID: CVE-2019-2987 DESCRIPTION: An unspecified vulnerability in Java SE related to the 2D component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base score: 3.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169293 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) CVEID: CVE-2019-2983 DESCRIPTION: An unspecified vulnerability in Java SE related to the Serialization component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base score: 3.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169289 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) CVEID: CVE-2019-2981 DESCRIPTION: An unspecified vulnerability in Java SE related to the JAXP component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base score: 3.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169287 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) CVEID: CVE-2019-2978 DESCRIPTION: An unspecified vulnerability in Java SE related to the Networking component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base score: 3.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169284 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) CVEID: CVE-2019-2973 DESCRIPTION: An unspecified vulnerability in Java SE related to the JAXP component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base score: 3.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169279 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) CVEID: CVE-2019-2962 DESCRIPTION: An unspecified vulnerability in Java SE related to the 2D component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base score: 3.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169268 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) CVEID: CVE-2019-2964 DESCRIPTION: An unspecified vulnerability in Java SE related to the Concurrency component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base score: 3.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169270 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) CVEID: CVE-2019-2945 DESCRIPTION: An unspecified vulnerability in Java SE related to the Networking component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base score: 3.1 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169250 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L) CVEID: CVE-2019-2933 DESCRIPTION: An unspecified vulnerability in Java SE related to the Libraries component could allow an unauthenticated attacker to obtain sensitive information resulting in a low confidentiality impact using unknown attack vectors. CVSS Base score: 3.1 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169238 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N) CVEID: CVE-2019-17631 DESCRIPTION: Eclipse OpenJ9 could allow a local attacker to gain elevated privileges on the system, caused by the failure to performs an authorization check when an actor attempts to access a resource or perform an action. An attacker could exploit this vulnerability to gain access to diagnostic operations such as causing a GC or creating a diagnostic file. CVSS Base score: 8.4 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169513 for the current score. CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) Affected Products and Versions IBM Java SDK shipped with IBM WebSphere Application Server Patterns 1.0.0.0 through 1.0.0.7 and 2.2.0.0 through 2.3.1.0. Remediation/Fixes Please see the IBM Java SDK Security Bulletin for WebSphere Application Server to determine which WebSphere Application Server versions are affected and to obtain the JDK fixes. The interim fix 1.0.0.0-WS-WASPATTERNS-JDK-1910 can be used to apply the October SDK iFixes in a PureApplication Environment. Download and apply the interim fix 1.0.0.0-WS-WASPATTERNS-JDK-1910. Workarounds and Mitigations None Get Notified about Future Security Bulletins References - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXfLeqGaOgq3Tt24GAQg3whAAkY+UFfz6RnOgE725dHzS5Siu5VjBObob T6znZQUiZHN1/2+sq3nMhg/kgxGqVmHE0gkTRMnTAINCEJjoBFwxp5TgYrH5r0EP 5DACbAc4EbSWP3i9bSoyZ9zDLD2lgY3K9gSfQufXCj6IaNWY9ShOAxJ2fLMfWOoE KKi7i2nuXcdXI+LiEZw5jymhWUxAcNGU9I1EKdVeQxPFc2fvOTkMje/SlsooE9CD B0VURHPRrsa0nq9OFPTZ9/63O0nouPuPWLIh+jC9iqIKl+/6V85ErP1PZpo2/AQj 6N1S4TtOqZ/9z2gx1ZwshRlXcXQ/k3uNIAaOxxmnc+ttVRDuIFNxFvq2Dmaat1GT +07ieYXBlzH2wjoWIVOHB0a8Cnq+RxpeUO1/r+sta1tj1HAIK1RZ1b/VHdsC3L3V GmwfWBnSODW0tzHEReOMfjWtw2K3b1LRyf3R2hU0OpFTRliWgIu7WDqo1OsgGxYg TO6ZMT0TQXc/RzxHmEiSfZA9sWFt3JqwW58e2f8OrRrNozFFDbqGJKFCc058BCDE DUqwGPJmZ1Sy8kP3m+vIHw8lE3L0J/Z48h6t00kL9J2dk6jufN+fLuhOXj4NiSex 2Di3cbvLq6UVSWUagYt9NgXVai/70Af4+ZjJ/ZanZqYdoV2pk6t7gANXC4iajiUT f2nco5JEwoQ= =FDv0 -----END PGP SIGNATURE-----