Operating System:

[Win]

Published:

10 March 2020

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.0855
  Security Bulletin: IBM SDK, Java Technology Edition Quarterly CPU - Oct
          2019 - Includes Oracle Oct 2019 CPU minus CVE-2019-2949
                               10 March 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           DB2 Query Management Facility
Publisher:         IBM
Operating System:  Windows
Impact/Access:     Modify Arbitrary Files   -- Remote/Unauthenticated
                   Increased Privileges     -- Existing Account      
                   Denial of Service        -- Remote/Unauthenticated
                   Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-17631 CVE-2019-2999 CVE-2019-2996
                   CVE-2019-2992 CVE-2019-2989 CVE-2019-2988
                   CVE-2019-2987 CVE-2019-2983 CVE-2019-2981
                   CVE-2019-2978 CVE-2019-2977 CVE-2019-2975
                   CVE-2019-2973 CVE-2019-2964 CVE-2019-2962
                   CVE-2019-2958 CVE-2019-2945 CVE-2019-2933
                   CVE-2019-2894  

Reference:         ASB-2019.0294
                   ASB-2019.0290
                   ESB-2020.0755
                   ESB-2020.0545
                   ESB-2020.0528
                   ESB-2019.4757

Original Bulletin: 
   https://www.ibm.com/support/pages/node/5694513

- --------------------------BEGIN INCLUDED TEXT--------------------

IBM SDK, Java Technology Edition Quarterly CPU - Oct 2019 - Includes Oracle Oct
2019 CPU minus CVE-2019-2949

Document number: 
5694513

Modified date: 
09 March 2020 

Security Bulletin

Summary

All applicable Java SE CVEs published by Oracle as part of their October 2019
Critical Patch Update, except for CVE-2019-2949, plus one additional
vulnerability. See attached document for full details. Note that the following
CVEs were incorrectly added to the list of vulnerabilities associated with this
Advisory:o CVE-2019-2894o CVE-2019-2977o CVE-2019-2987 These issues are not
applicable for all releases of the IBM JDK on all platforms. Product teams
should treat these CVEs as N/A in their PVRs.

Vulnerability Details

CVEID: CVE-2019-2989
DESCRIPTION: An unspecified vulnerability in Java SE could allow an
unauthenticated attacker to cause no confidentiality impact, high integrity
impact, and no availability impact.
CVSS Base score: 6.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169295 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N)

CVEID: CVE-2019-2958
DESCRIPTION: An unspecified vulnerability in Java SE related to the Libraries
component could allow an unauthenticated attacker to cause no confidentiality
impact, high integrity impact, and no availability impact.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169264 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)

CVEID: CVE-2019-2977
DESCRIPTION: An unspecified vulnerability in Java SE related to the VM
component could allow an unauthenticated attacker to cause low confidentiality
impact, no integrity impact, and low availability impact.
CVSS Base score: 4.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169283 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L)

CVEID: CVE-2019-2975
DESCRIPTION: An unspecified vulnerability in Java SE related to the Scripting
component could allow an unauthenticated attacker to cause no confidentiality
impact, low integrity impact, and low availability impact.
CVSS Base score: 4.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169281 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)

CVEID: CVE-2019-2999
DESCRIPTION: An unspecified vulnerability in Java SE related to the Javadoc
component could allow an unauthenticated attacker to cause low confidentiality
impact, low integrity impact, and no availability impact.
CVSS Base score: 4.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169305 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N)

CVEID: CVE-2019-2996
DESCRIPTION: An unspecified vulnerability in Java SE related to the Deployment
component could allow an unauthenticated attacker to cause low confidentiality
impact, low integrity impact, and no availability impact.
CVSS Base score: 4.2
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169302 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N)

CVEID: CVE-2019-2894
DESCRIPTION: An unspecified vulnerability in Java SE related to the Security
component could allow an unauthenticated attacker to obtain sensitive
information resulting in a low confidentiality impact using unknown attack
vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169207 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2019-2992
DESCRIPTION: An unspecified vulnerability in Java SE related to the 2D
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169298 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2988
DESCRIPTION: An unspecified vulnerability in Java SE related to the 2D
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169294 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2987
DESCRIPTION: An unspecified vulnerability in Java SE related to the 2D
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169293 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2983
DESCRIPTION: An unspecified vulnerability in Java SE related to the
Serialization component could allow an unauthenticated attacker to cause a
denial of service resulting in a low availability impact using unknown attack
vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169289 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2981
DESCRIPTION: An unspecified vulnerability in Java SE related to the JAXP
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169287 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2978
DESCRIPTION: An unspecified vulnerability in Java SE related to the Networking
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169284 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2973
DESCRIPTION: An unspecified vulnerability in Java SE related to the JAXP
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169279 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2962
DESCRIPTION: An unspecified vulnerability in Java SE related to the 2D
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169268 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2964
DESCRIPTION: An unspecified vulnerability in Java SE related to the Concurrency
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169270 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2945
DESCRIPTION: An unspecified vulnerability in Java SE related to the Networking
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169250 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2933
DESCRIPTION: An unspecified vulnerability in Java SE related to the Libraries
component could allow an unauthenticated attacker to obtain sensitive
information resulting in a low confidentiality impact using unknown attack
vectors.
CVSS Base score: 3.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169238 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N)

CVEID: CVE-2019-17631
DESCRIPTION: Eclipse OpenJ9 could allow a local attacker to gain elevated
privileges on the system, caused by the failure to performs an authorization
check when an actor attempts to access a resource or perform an action. An
attacker could exploit this vulnerability to gain access to diagnostic
operations such as causing a GC or creating a diagnostic file.
CVSS Base score: 8.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169513 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

+--------------------------------------------+----------+
|Affected Product(s)                         |Version(s)|
+--------------------------------------------+----------+
|DB2 Query Management Facility for z/OS      |11.2.1    |
+--------------------------------------------+----------+
|DB2 Query Management Facility for z/OS      |12.1      |
+--------------------------------------------+----------+
|Query Management Facility Classic Edition   |11.1      |
+--------------------------------------------+----------+
|DB2 Query Management Facility for z/OS      |12.2      |
+--------------------------------------------+----------+
|Query Management Facility Enterprise Edition|11.1      |
+--------------------------------------------+----------+
|DB2 Query Management Facility for z/OS      |11.2      |
+--------------------------------------------+----------+
|DB2 Query Management Facility for z/OS      |11.1      |
+--------------------------------------------+----------+

Remediation/Fixes

Please see "Workarounds"

Workarounds and Mitigations

Steps toupdateJava- QMF for Workstation:

1. Download JRE 8.0. 6.5 version from IBMJavadownload portal.

2. Close QMF for workstation , if any instance is running.

3. Copy 8.0. 6.5 JRE version to C:\Program Files\IBM\Db2 Query Management
Facility\QMF for

Workstation\jre.

4. Start application

Steps toupdateJava- QMF Vision:

1. Go to : https://adoptopenjdk.net/releases.html

2. Download Open JDK 8(LTS) and extract the files to a temporary location.

3. Stop the following Windows services:

- - IBM QMF Vision Indexing Service (this will also stop IBM QMF Vision Web
Service due to dependencies)

- - QMFServerLite

4. Delete C:\Program Files\IBM\DB2 Query Management Facility\QMF Vision\
elasticsearch\java\jre1.8.0_131.

Note: The folder name would be "jre" in case security bulletin reference #
0880785 is already applied.

5. Copy content of downloaded jre from the temporary location (step # 2) to C:\
Program Files\IBM\DB2 Query Management Facility\QMF Vision\elasticsearch\java.

6. Rename folder jre1.8.0_ 131 to jre.

Note: If the folder in the java folder is already renamed to "jre" via the
security bulletin reference

# 0880785, then steps 7 through 12 are not required. You can directly go to
step 13 and start the relevant Services.

Security bulletin # 0880785 link - https://www-01.ibm.com/support/docview.wss
uid=ibm10880785

7. Under C:\Program Files\IBM\DB2 Query Management Facility\QMF Vision\, edit
the following 6 files:

elasticsearch/bin/install.bat

elasticsearch/bin/start.bat

elasticsearch/bin/stop.bat

elasticsearch/bin/uninstall.bat

qmfserver/bat/setenv.bat

qmfserver/conf/wrapper.conf

For each file, replace "jre1.8.0_131" with "jre", and save.

8. Open a Windows Command window in Administrator mode and Change directory to
elasticsearch/bin.

9. Execute:

uninstall.bat

install.bat

10. Change directory to qmfserver/bat.

11 Execute:

uninstallService.bat

installService.bat.

12. In the Windows Services console, edit "IBM QMF Vision Indexing Service" to
change startup type from "Manual" to "Automatic".

13. Restart Windows Services:

- - IBM QMF Vision Indexing Service

- - IBM QMF Vision Web Service

- - QMFServerLite

Get Notified about Future Security Bulletins

References

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=45ro
-----END PGP SIGNATURE-----