Operating System:

[AIX]

Published:

23 December 2019

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.4780
         Security Bulletin: Vulnerabilities in Curl affect PowerSC
                      (CVE-2019-5435, CVE-2019-5436)
                             23 December 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM PowerSC Express Edition
Publisher:         IBM
Operating System:  AIX
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-5436 CVE-2019-5435 

Reference:         ESB-2019.2839
                   ESB-2019.2392
                   ESB-2019.1917

Original Bulletin: 
   https://www.ibm.com/support/pages/node/1108041

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Vulnerabilities in Curl affect PowerSC (CVE-2019-5435,
CVE-2019-5436)

Document Information

Product            : PowerSC Express Edition
Component          : PowerSC
Software version   : 1.2
Operating system(s): AIX
Edition            : All

Summary

There are vulnerabilities in Curl that affect PowerSC.

Vulnerability Details

CVEID: CVE-2019-5435
DESCRIPTION: An integer overflow in curl's URL API results in a buffer
overflow in libcurl 7.62.0 to and including 7.64.1.
CVSS Base score: 7.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities
/161429 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

CVEID: CVE-2019-5436
DESCRIPTION: A heap buffer overflow in the TFTP receiving code allows for DoS
or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.
CVSS Base score: 6.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities
/161431 for the current score.
CVSS Vector: (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

Affected Products and Versions

+-------------------+----------+
|Affected Product(s)|Version(s)|
+-------------------+----------+
|PowerSC            |1.2       |
+-------------------+----------+

The following fileset levels are vulnerable:

Fileset                                Lower Level     Upper Level
powerscStd.tnc_pm                      1.2.0.0         1.2.0.3
curl-7.65.1-1.aix6.1.ppc.rpm           7.19.4          7.64.1

Note: To find out whether the affected PowerSC filesets are installed on your
systems, refer to the lslpp command found in AIX user's guide.

Example: rpm -qa | grep curl

Remediation/Fixes

A. FIXES

Fixes are available.

The fixes can be downloaded via ftp or http from:

ftp://aix.software.ibm.com/aix/efixes/powersc/security/curl_fix.tar
http://aix.software.ibm.com/aix/efixes/powersc/security/curl_fix.tar
https://aix.software.ibm.com/aix/efixes/powersc/security/curl_fix.tar

The link above is a tar file containing this signed advisory, open source fix
packages, and OpenSSL signatures for each package.

To extract the fixes from the tar file:

tar xvf curl_fix.tar

cd curl_fix

Verify you have retrieved the fixes intact:

The checksums below were generated using the "openssl dgst -sha256 [filename]"
command as the following:

openssl dgst -sha256 filename KEY
- -----------------------------------------------------------------------------------------------------------------------

56e394405836f1bdf7d188cef30adf5f6151fe594b39576dfbd953435e192569
ca-certificates-2016.10.7-2.aix6.1.ppc.rpm key_w_csum
5f01da544ae221c3f98ecd864782597b326f7838bb759cbb44b8366cad2eaeee
curl-7.65.1-1.aix6.1.ppc.rpm key_w_csum
3ef01f3aea3e62ce402158ea892dfdb101d2c2f1c06256c6a245dc3126610bc0
db-6.2.32-2.aix6.1.ppc.rpm key_w_csum
7d1b39e1b8ab29a33edf9bb8fb589e071a6e0e06b69182f8a08776f497715f49
krb5-libs-1.16.1-2.aix6.1.ppc.rpm key_w_csum
dfd52c9b162b075abdaea908910ade3ee13d923e36a7e45cf6e1308ef5e62b52
libgcc-8.1.0-2.aix7.2.ppc.rpm key_w_csum

These sums should match exactly. The OpenSSL signatures in the tar file and on
this advisory can also be used to verify the integrity of the fixes. If the
sums or signatures cannot be confirmed, contact IBM Support.

openssl dgst -sha1 -verify <pubkey_file> -signature <advisory_file>.sig
<advisory_file>

openssl dgst -sha1 -verify <pubkey_file> -signature <ifix_file>.sig
<ifix_file>

Published advisory OpenSSL signature file location:

http://aix.software.ibm.com/aix/efixes/powersc/security/curl_advisory.asc.sig
https://aix.software.ibm.com/aix/efixes/powersc/security/curl_advisory.asc.sig
ftp://aix.software.ibm.com/aix/efixes/powersc/security/curl_advisory.as...

B. FIX AND INTERIM FIX INSTALLATION

IMPORTANT: If possible, it is recommended that a mksysb backup of the system
be created. Verify it is both bootable and readable before proceeding.

To extract the fixes from the tar file:

tar xvf curl_fix.tar
cd curl_fix

To install a fix package:

rpm -ivh *.rpm
rpm -Uvh *.rpm

Interim fixes have had limited functional and regression testing but not the
full regression testing that takes place for Service Packs; however, IBM does
fully support them.

Workarounds and Mitigations

None.

Change History

11 Nov 2019: Initial Publication

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Document Location

Worldwide

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=QqNh
-----END PGP SIGNATURE-----