-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.0347
  Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM
         Virtualization Engine TS7700 - July 2019 and October 2019
                              30 January 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM TS7700 virtual tape systems
Publisher:         IBM
Operating System:  Network Appliance
Impact/Access:     Modify Arbitrary Files   -- Remote/Unauthenticated
                   Denial of Service        -- Remote/Unauthenticated
                   Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-2989 CVE-2019-2978 CVE-2019-2816
                   CVE-2019-2769 CVE-2019-2762 

Reference:         ASB-2019.0339
                   ASB-2019.0294
                   ESB-2020.0102
                   ESB-2020.0097

Original Bulletin: 
   https://www.ibm.com/support/pages/node/1275214

- --------------------------BEGIN INCLUDED TEXT--------------------

Multiple vulnerabilities in IBM Java SDK affect IBM Virtualization Engine
TS7700 - July 2019 and October 2019

Security Bulletin

Summary

There are multiple vulnerabilities in IBM SDKs Java Technology Edition,
Versions 7 and 8, as used by IBM Virtualization Engine TS7700. These issues
were disclosed as part of the IBM Java SDK updates in July 2019 and October
2019. IBM Virtualization Engine TS7700 has addressed the applicable CVEs.

Vulnerability Details

CVEID: CVE-2019-2989
DESCRIPTION: An unspecified vulnerability in Java SE could allow an
unauthenticated attacker to cause no confidentiality impact, high integrity
impact, and no availability impact.
CVSS Base score: 6.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169295 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N)

CVEID: CVE-2019-2978
DESCRIPTION: An unspecified vulnerability in Java SE related to the Networking
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169284 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2816
DESCRIPTION: Vulnerability in the Java SE, Java SE Embedded component of Oracle
Java SE (subcomponent: Networking). Supported versions that are affected are
Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to
exploit vulnerability allows unauthenticated attacker with network access via
multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks
of this vulnerability can result in unauthorized update, insert or delete
access to some of Java SE, Java SE Embedded accessible data as well as
unauthorized read access to a subset of Java SE, Java SE Embedded accessible
data. Note: This vulnerability applies to Java deployments, typically in
clients running sandboxed Java Web Start applications or sandboxed Java applets
(in Java SE 8), that load and run untrusted code (e.g., code that comes from
the internet) and rely on the Java sandbox for security. This vulnerability can
also be exploited by using APIs in the specified Component, e.g., through a web
service which supplies data to the APIs. CVSS 3.0 Base Score 4.8
(Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/
UI:N/S:U/C:L/I:L/A:N).
CVSS Base score: 4.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
163878 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVEID: CVE-2019-2762
DESCRIPTION: Vulnerability in the Java SE, Java SE Embedded component of Oracle
Java SE (subcomponent: Utilities). Supported versions that are affected are
Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily
exploitable vulnerability allows unauthenticated attacker with network access
via multiple protocols to compromise Java SE, Java SE Embedded. Successful
attacks of this vulnerability can result in unauthorized ability to cause a
partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note:
This vulnerability applies to Java deployments, typically in clients running
sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8),
that load and run untrusted code (e.g., code that comes from the internet) and
rely on the Java sandbox for security. This vulnerability can also be exploited
by using APIs in the specified Component, e.g., through a web service which
supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS
Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
163826 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2769
DESCRIPTION: Vulnerability in the Java SE, Java SE Embedded component of Oracle
Java SE (subcomponent: Utilities). Supported versions that are affected are
Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily
exploitable vulnerability allows unauthenticated attacker with network access
via multiple protocols to compromise Java SE, Java SE Embedded. Successful
attacks of this vulnerability can result in unauthorized ability to cause a
partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note:
This vulnerability applies to Java deployments, typically in clients running
sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8),
that load and run untrusted code (e.g., code that comes from the internet) and
rely on the Java sandbox for security. This vulnerability can also be exploited
by using APIs in the specified Component, e.g., through a web service which
supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS
Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
163832 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

Affected Products and Versions

All versions of microcode for the IBM Virtualization Engine TS7700 (3957-V07,
3957-VEB, 3957-VEC, 3957-VED) prior to and including the following are
affected:

+-------------+-----+----------+
|Machine Type |Model|Version   |
+-------------+-----+----------+
|3957         |V07  |8.42.2.12 |
+-------------+-----+----------+
|3957         |VEB  |8.42.2.12 |
+-------------+-----+----------+
|3957         |VEC  |8.50.0.134|
+-------------+-----+----------+
|3957         |VED  |8.50.0.134|
+-------------+-----+----------+

Remediation/Fixes

Contact IBM Service at 1-800-IBM-SERV to arrange an upgrade to the latest
microcode version followed by the installation of VTD_EXEC.269 as needed.
Minimum microcode versions are shown below:

+------------+-----+------------------------------------+
|Machine Type|Model|Fix                                 |
+------------+-----+------------------------------------+
|            |     |Machines with 16GB RAM:             |
|            |     |                                    |
|            |     |Upgrade to 8.33.3.14 + VTD_EXEC.269 |
|            |     |                                    |
|            |     |Machines with 32GB RAM:             |
|3957        |V07  |                                    |
|            |     |Upgrade to 8.41.201.4 + VTD_EXEC.269|
|            |     |                                    |
|            |     |- OR -                              |
|            |     |                                    |
|            |     |Upgrade to 8.42.2.12 + VTD_EXEC.269 |
+------------+-----+------------------------------------+
|            |     |Machines with 16GB RAM:             |
|            |     |                                    |
|            |     |Upgrade to 8.33.3.14 + VTD_EXEC.269 |
|            |     |                                    |
|            |     |Machines with 32GB RAM:             |
|3957        |VEB  |                                    |
|            |     |Upgrade to 8.41.201.4 + VTD_EXEC.269|
|            |     |                                    |
|            |     |- OR -                              |
|            |     |                                    |
|            |     |Upgrade to 8.42.2.12 + VTD_EXEC.269 |
+------------+-----+------------------------------------+
|            |     |Upgrade to 8.41.201.4 + VTD_EXEC.269|
|            |     |                                    |
|            |     |- OR -                              |
|            |     |                                    |
|3957        |VEC  |Upgrade to 8.42.2.12 + VTD_EXEC.269 |
|            |     |                                    |
|            |     |- OR -                              |
|            |     |                                    |
|            |     |Upgrade to 8.50.0.134 + VTD_EXEC.269|
+------------+-----+------------------------------------+
|3957        |VED  |Upgrade to 8.50.0.134 + VTD_EXEC.269|
+------------+-----+------------------------------------+

The minimum VTD_EXEC version is shown below:

+-----------------+-------+
|VTD_EXEC Package |Version|
+-----------------+-------+
|VTD_EXEC.269     |v1.14  |
+-----------------+-------+

Workarounds and Mitigations

Although IBM recommends that you upgrade to the fixes identified above, you can
mitigate, but not eliminate the risk of these vulnerabilities by restricting
physical and network access to the TS7700 to authorized users and IBM Service
Personnel only.

Get Notified about Future Security Bulletins

References

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=w/Wa
-----END PGP SIGNATURE-----