Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.0855 Security Bulletin: IBM SDK, Java Technology Edition Quarterly CPU - Oct 2019 - Includes Oracle Oct 2019 CPU minus CVE-2019-2949 10 March 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: DB2 Query Management Facility Publisher: IBM Operating System: Windows Impact/Access: Modify Arbitrary Files -- Remote/Unauthenticated Increased Privileges -- Existing Account Denial of Service -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-17631 CVE-2019-2999 CVE-2019-2996 CVE-2019-2992 CVE-2019-2989 CVE-2019-2988 CVE-2019-2987 CVE-2019-2983 CVE-2019-2981 CVE-2019-2978 CVE-2019-2977 CVE-2019-2975 CVE-2019-2973 CVE-2019-2964 CVE-2019-2962 CVE-2019-2958 CVE-2019-2945 CVE-2019-2933 CVE-2019-2894 Reference: ASB-2019.0294 ASB-2019.0290 ESB-2020.0755 ESB-2020.0545 ESB-2020.0528 ESB-2019.4757 Original Bulletin: https://www.ibm.com/support/pages/node/5694513 - --------------------------BEGIN INCLUDED TEXT-------------------- IBM SDK, Java Technology Edition Quarterly CPU - Oct 2019 - Includes Oracle Oct 2019 CPU minus CVE-2019-2949 Document number: 5694513 Modified date: 09 March 2020 Security Bulletin Summary All applicable Java SE CVEs published by Oracle as part of their October 2019 Critical Patch Update, except for CVE-2019-2949, plus one additional vulnerability. See attached document for full details. Note that the following CVEs were incorrectly added to the list of vulnerabilities associated with this Advisory:o CVE-2019-2894o CVE-2019-2977o CVE-2019-2987 These issues are not applicable for all releases of the IBM JDK on all platforms. Product teams should treat these CVEs as N/A in their PVRs. Vulnerability Details CVEID: CVE-2019-2989 DESCRIPTION: An unspecified vulnerability in Java SE could allow an unauthenticated attacker to cause no confidentiality impact, high integrity impact, and no availability impact. CVSS Base score: 6.8 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169295 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N) CVEID: CVE-2019-2958 DESCRIPTION: An unspecified vulnerability in Java SE related to the Libraries component could allow an unauthenticated attacker to cause no confidentiality impact, high integrity impact, and no availability impact. CVSS Base score: 5.9 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169264 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N) CVEID: CVE-2019-2977 DESCRIPTION: An unspecified vulnerability in Java SE related to the VM component could allow an unauthenticated attacker to cause low confidentiality impact, no integrity impact, and low availability impact. CVSS Base score: 4.8 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169283 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L) CVEID: CVE-2019-2975 DESCRIPTION: An unspecified vulnerability in Java SE related to the Scripting component could allow an unauthenticated attacker to cause no confidentiality impact, low integrity impact, and low availability impact. CVSS Base score: 4.8 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169281 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L) CVEID: CVE-2019-2999 DESCRIPTION: An unspecified vulnerability in Java SE related to the Javadoc component could allow an unauthenticated attacker to cause low confidentiality impact, low integrity impact, and no availability impact. CVSS Base score: 4.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169305 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N) CVEID: CVE-2019-2996 DESCRIPTION: An unspecified vulnerability in Java SE related to the Deployment component could allow an unauthenticated attacker to cause low confidentiality impact, low integrity impact, and no availability impact. CVSS Base score: 4.2 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169302 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N) CVEID: CVE-2019-2894 DESCRIPTION: An unspecified vulnerability in Java SE related to the Security component could allow an unauthenticated attacker to obtain sensitive information resulting in a low confidentiality impact using unknown attack vectors. CVSS Base score: 3.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169207 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N) CVEID: CVE-2019-2992 DESCRIPTION: An unspecified vulnerability in Java SE related to the 2D component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base score: 3.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169298 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) CVEID: CVE-2019-2988 DESCRIPTION: An unspecified vulnerability in Java SE related to the 2D component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base score: 3.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169294 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) CVEID: CVE-2019-2987 DESCRIPTION: An unspecified vulnerability in Java SE related to the 2D component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base score: 3.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169293 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) CVEID: CVE-2019-2983 DESCRIPTION: An unspecified vulnerability in Java SE related to the Serialization component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base score: 3.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169289 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) CVEID: CVE-2019-2981 DESCRIPTION: An unspecified vulnerability in Java SE related to the JAXP component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base score: 3.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169287 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) CVEID: CVE-2019-2978 DESCRIPTION: An unspecified vulnerability in Java SE related to the Networking component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base score: 3.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169284 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) CVEID: CVE-2019-2973 DESCRIPTION: An unspecified vulnerability in Java SE related to the JAXP component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base score: 3.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169279 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) CVEID: CVE-2019-2962 DESCRIPTION: An unspecified vulnerability in Java SE related to the 2D component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base score: 3.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169268 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) CVEID: CVE-2019-2964 DESCRIPTION: An unspecified vulnerability in Java SE related to the Concurrency component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base score: 3.7 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169270 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) CVEID: CVE-2019-2945 DESCRIPTION: An unspecified vulnerability in Java SE related to the Networking component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVSS Base score: 3.1 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169250 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L) CVEID: CVE-2019-2933 DESCRIPTION: An unspecified vulnerability in Java SE related to the Libraries component could allow an unauthenticated attacker to obtain sensitive information resulting in a low confidentiality impact using unknown attack vectors. CVSS Base score: 3.1 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169238 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N) CVEID: CVE-2019-17631 DESCRIPTION: Eclipse OpenJ9 could allow a local attacker to gain elevated privileges on the system, caused by the failure to performs an authorization check when an actor attempts to access a resource or perform an action. An attacker could exploit this vulnerability to gain access to diagnostic operations such as causing a GC or creating a diagnostic file. CVSS Base score: 8.4 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 169513 for the current score. CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) Affected Products and Versions +--------------------------------------------+----------+ |Affected Product(s) |Version(s)| +--------------------------------------------+----------+ |DB2 Query Management Facility for z/OS |11.2.1 | +--------------------------------------------+----------+ |DB2 Query Management Facility for z/OS |12.1 | +--------------------------------------------+----------+ |Query Management Facility Classic Edition |11.1 | +--------------------------------------------+----------+ |DB2 Query Management Facility for z/OS |12.2 | +--------------------------------------------+----------+ |Query Management Facility Enterprise Edition|11.1 | +--------------------------------------------+----------+ |DB2 Query Management Facility for z/OS |11.2 | +--------------------------------------------+----------+ |DB2 Query Management Facility for z/OS |11.1 | +--------------------------------------------+----------+ Remediation/Fixes Please see "Workarounds" Workarounds and Mitigations Steps toupdateJava- QMF for Workstation: 1. Download JRE 8.0. 6.5 version from IBMJavadownload portal. 2. Close QMF for workstation , if any instance is running. 3. Copy 8.0. 6.5 JRE version to C:\Program Files\IBM\Db2 Query Management Facility\QMF for Workstation\jre. 4. Start application Steps toupdateJava- QMF Vision: 1. Go to : https://adoptopenjdk.net/releases.html 2. Download Open JDK 8(LTS) and extract the files to a temporary location. 3. Stop the following Windows services: - - IBM QMF Vision Indexing Service (this will also stop IBM QMF Vision Web Service due to dependencies) - - QMFServerLite 4. Delete C:\Program Files\IBM\DB2 Query Management Facility\QMF Vision\ elasticsearch\java\jre1.8.0_131. Note: The folder name would be "jre" in case security bulletin reference # 0880785 is already applied. 5. Copy content of downloaded jre from the temporary location (step # 2) to C:\ Program Files\IBM\DB2 Query Management Facility\QMF Vision\elasticsearch\java. 6. Rename folder jre1.8.0_ 131 to jre. Note: If the folder in the java folder is already renamed to "jre" via the security bulletin reference # 0880785, then steps 7 through 12 are not required. You can directly go to step 13 and start the relevant Services. Security bulletin # 0880785 link - https://www-01.ibm.com/support/docview.wss uid=ibm10880785 7. Under C:\Program Files\IBM\DB2 Query Management Facility\QMF Vision\, edit the following 6 files: elasticsearch/bin/install.bat elasticsearch/bin/start.bat elasticsearch/bin/stop.bat elasticsearch/bin/uninstall.bat qmfserver/bat/setenv.bat qmfserver/conf/wrapper.conf For each file, replace "jre1.8.0_131" with "jre", and save. 8. Open a Windows Command window in Administrator mode and Change directory to elasticsearch/bin. 9. Execute: uninstall.bat install.bat 10. Change directory to qmfserver/bat. 11 Execute: uninstallService.bat installService.bat. 12. In the Windows Services console, edit "IBM QMF Vision Indexing Service" to change startup type from "Manual" to "Automatic". 13. Restart Windows Services: - - IBM QMF Vision Indexing Service - - IBM QMF Vision Web Service - - QMFServerLite Get Notified about Future Security Bulletins References - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXmgNW2aOgq3Tt24GAQidFBAAwsFNKKdWUl7/JHx3tyWfsmz/Yi0aSoWr hOjiTUVZ3nNHw3LhBXKHJHViY/wGno6ZNmUEeeGUo4LaT52uiLJtPhgjxxXiXILn sGSW8API7quxf+MzJnPSacKY0g6OE8lxD/+qDTES5lsNfqXYJzw/iZFcGSXXERt1 6FrbKDxkQLpu1Sm+RGG5fpbHAh9SJX9mxlQcN1cHcZqxh6eFIjU4lbIm9YzZFNz9 T4TUb7KCUBUoTeZlZ08gH0c9JOjicKiJU4bI+C5V3YXpA3NOBpp1M2nOR47V9aCO Ns5JyU1pz9XIe/1CdCghyyTkLWm+MslFVPLWn4QoIGUaFrcKJ+jeNa9OdbMwjFPU EeXPEGEGgaBl85NDtNRVGuwHJFtlkA4fBIcX6OZwzMkr5CVZ4kyMOXijLlJ6dQhD MHnihX9zI/X20QsM5Zmx7Y9js/xIngR4xoqHD9bqUsFUu9JQYVPnUd6wKN7sPf08 d+Mu4Qy7RQaChzQ/g+fVCP0uyIkMpyZCCCETHe+S090NS8gfcWsCqmb00D/xVeHa JSQlLO8gMCW7tcIsThqPZw8iCi4+pYR156jE9w4rLPfTX5OOkwfebBWNCMLRuM5J qF5BDUQSfoKbivbo2qlaxFyGo4GmwNpB+J5AO8UjizLelqwJNKZdAI+lLaX+k1IV DiArjoWOPaU= =45ro -----END PGP SIGNATURE-----