-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.4782
Security vulnerabilities in IBM Java Runtime affect IBM License Key Server
                Administration and Reporting Tool and Agent
                             23 December 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM License Key Server Administration and Reporting Tool
Publisher:         IBM
Operating System:  AIX
                   Linux variants
                   Windows
Impact/Access:     Denial of Service        -- Remote/Unauthenticated
                   Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-17631 CVE-2019-2989 CVE-2019-2964
                   CVE-2019-2958 CVE-2019-2945 CVE-2019-2933

Reference:         ASB-2019.0294
                   ASB-2019.0290

Original Bulletin: 
   https://www.ibm.com/support/pages/node/1138240

- --------------------------BEGIN INCLUDED TEXT--------------------

  Security Bulletin: Security vulnerabilities in IBM Java Runtime affect IBM
        License Key Server Administration and Reporting Tool and Agent

  Security Bulletin

Summary

   There are multiple vulnerabilities related to IBM(R) Runtime Environment
   Java(TM) Technology Edition which is used and shipped by different
   versions of IBM License Key Server Administration and Reporting Tool
   (ART) and Agent.

Vulnerability Details

   CVEID:   CVE-2019-2933
   DESCRIPTION:   An unspecified vulnerability in Java SE related to the
   Libraries component could allow an unauthenticated attacker to obtain
   sensitive information resulting in a low confidentiality impact using
   unknown attack vectors.
   CVSS Base score: 3.1
   CVSS Temporal Score:
   See: https://exchange.xforce.ibmcloud.com/vulnerabilities/169238 for the
   current score.
   CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N)
   CVEID:   CVE-2019-2945
   DESCRIPTION:   An unspecified vulnerability in Java SE related to the
   Networking component could allow an unauthenticated attacker to cause a
   denial of service resulting in a low availability impact using unknown
   attack vectors.
   CVSS Base score: 3.1
   CVSS Temporal Score:
   See: https://exchange.xforce.ibmcloud.com/vulnerabilities/169250 for the
   current score.
   CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L)
   CVEID:   CVE-2019-2958
   DESCRIPTION:   An unspecified vulnerability in Java SE related to the
   Libraries component could allow an unauthenticated attacker to cause no
   confidentiality impact, high integrity impact, and no availability
   impact.
   CVSS Base score: 5.9
   CVSS Temporal Score:
   See: https://exchange.xforce.ibmcloud.com/vulnerabilities/169264 for the
   current score.
   CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)
   CVEID:   CVE-2019-2964
   DESCRIPTION:   An unspecified vulnerability in Java SE related to the
   Concurrency component could allow an unauthenticated attacker to cause a
   denial of service resulting in a low availability impact using unknown
   attack vectors.
   CVSS Base score: 3.7
   CVSS Temporal Score:
   See: https://exchange.xforce.ibmcloud.com/vulnerabilities/169270 for the
   current score.
   CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)
   CVEID:   CVE-2019-2989
   DESCRIPTION:   An unspecified vulnerability in Java SE could allow an
   unauthenticated attacker to cause no confidentiality impact, high
   integrity impact, and no availability impact.
   CVSS Base score: 6.8
   CVSS Temporal Score:
   See: https://exchange.xforce.ibmcloud.com/vulnerabilities/169295 for the
   current score.
   CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N)
   CVEID:   CVE-2019-17631
   DESCRIPTION:   Eclipse OpenJ9 could allow a local attacker to gain
   elevated privileges on the system, caused by the failure to performs an
   authorization check when an actor attempts to access a resource or
   perform an action. An attacker could exploit this vulnerability to gain
   access to diagnostic operations such as causing a GC or creating a
   diagnostic file.
   CVSS Base score: 8.4
   CVSS Temporal Score:
   See: https://exchange.xforce.ibmcloud.com/vulnerabilities/169513 for the
   current score.
   CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

     * IBM LKS Administration and Reporting Tool version 8.1.5
     * IBM LKS Administration and Reporting Tool version 8.1.5.1
     * IBM LKS Administration and Reporting Tool version 8.1.5.2
     * IBM LKS Administration and Reporting Tool version 8.1.5.3
     * IBM LKS Administration and Reporting Tool version 8.1.5.4
     * IBM LKS Administration and Reporting Tool version 8.1.5.5
     * IBM LKS Administration and Reporting Tool version 8.1.5.6
     * IBM LKS Administration and Reporting Tool version 8.1.6
     * IBM LKS Administration and Reporting Tool version 8.1.6.1
     * IBM LKS Administration and Reporting Tool version 8.1.6.2

     * IBM LKS Administration and Reporting Agent version 8.1.5
     * IBM LKS Administration and Reporting Agent version 8.1.5.1
     * IBM LKS Administration and Reporting Agent version 8.1.5.2
     * IBM LKS Administration and Reporting Agent version 8.1.5.3
     * IBM LKS Administration and Reporting Agent version 8.1.5.4
     * IBM LKS Administration and Reporting Agent version 8.1.5.5
     * IBM LKS Administration and Reporting Agent version 8.1.5.6
     * IBM LKS Administration and Reporting Agent version 8.1.6
     * IBM LKS Administration and Reporting Agent version 8.1.6.1
     * IBM LKS Administration and Reporting Agent version 8.1.6.2

Remediation/Fixes

   Upgrade to the version 8.1.6.2 for both IBM License Key Server
   Administration and Reporting Tool (ART) and Agent. Refer to the Release
   Notes for download and upgrade instructions.

Workarounds and Mitigations

   None

Change History

   21 December 2019: Original version published

   *The CVSS Environment Score is customer environment specific and will
   ultimately impact the Overall CVSS Score. Customers can evaluate the
   impact of this vulnerability in their environments by accessing the
   links in the Reference section of this Security Bulletin.

Disclaimer

   According to the Forum of Incident Response and Security Teams (FIRST),
   the Common Vulnerability Scoring System (CVSS) is an "industry open
   standard designed to convey vulnerability severity and help to determine
   urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS
   IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF
   MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE
   RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY
   VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=HgLe
-----END PGP SIGNATURE-----