-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2020.1644.2
        Security Bulletin: Multiple Security Vulnerabilities in IBM
                  Java Runtime affects IBM Cloud Private
                             28 September 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Cloud Private
Publisher:         IBM
Operating System:  Linux variants
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account      
                   Modify Arbitrary Files          -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Provide Misleading Information  -- Remote/Unauthenticated
                   Reduced Security                -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-2659 CVE-2020-2654 CVE-2020-2604
                   CVE-2020-2593 CVE-2020-2583 CVE-2019-17495
                   CVE-2019-15606 CVE-2019-15605 CVE-2019-12406
                   CVE-2019-4732 CVE-2019-4720 

Reference:         ASB-2020.0028
                   ASB-2020.0027
                   ESB-2020.1544
                   ESB-2020.1451
                   ESB-2020.1376
                   ESB-2020.1019

Original Bulletin: 
   https://www.ibm.com/support/pages/node/6208298
   https://www.ibm.com/support/pages/node/6208295
   https://www.ibm.com/support/pages/node/6208292
   https://www.ibm.com/support/pages/node/6208293
   https://www.ibm.com/support/pages/node/6208294
   https://www.ibm.com/support/pages/node/6208296

Revision History:  September 28 2020: Minor advisory update
                   May       11 2020: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

A Security Vulnerability in IBM Java Runtime affects IBM Cloud Private
(CVE-2020-2654)

Security Bulletin

Summary

A security vulnerability in IBM Java Runtime affects IBM Cloud Private
(CVE-2020-2654)

Vulnerability Details

CVEID: CVE-2020-2654
DESCRIPTION: An unspecified vulnerability in Java SE related to the Java SE
Libraries component could allow an unauthenticated attacker to cause a denial
of service resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
174601 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

Affected Products and Versions

+--------------------+----------+
|Affected Product(s) |Version(s)|
+--------------------+----------+
|IBM Cloud Private   |3.2.1 CD  |
+--------------------+----------+
|IBM Cloud Private   |3.2.0 CD  |
+--------------------+----------+

Remediation/Fixes

Product defect fixes and security updates are only available for the two most
recent Continuous Delivery (CD) update packages

  o IBM Cloud Private 3.2.0
  o IBM Cloud Private 3.2.1

For IBM Cloud Private 3.2.0, apply March fix pack:

  o IBM Cloud Private 3.2.0.2003 fix pack

For IBM Cloud Private 3.2.1, apply March fix pack:

  o IBM Cloud Private 3.2.1.2003 fix pack

For IBM Cloud Private 3.1.0, 3.1.1, 3.1.2:

  o Upgrade to the latest Continuous Delivery (CD) update package, IBM Cloud
    Private 3.2.1.
  o If required, individual product fixes can be made available between CD
    update packages for resolution of problems. Contact IBM support for
    assistance

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- -----------------------------------------------------------------------------

IBM Cloud Private is vulnerable to an IBM WebSphere Application Server Liberty
vulnerability (CVE-2019-12406)

Security Bulletin

Summary

IBM Cloud Private is vulnerable to an IBM WebSphere Application Server Liberty
vulnerability

Vulnerability Details

CVEID: CVE-2019-12406
DESCRIPTION: Apache CXF is vulnerable to a denial of service, caused by the
failure to restrict the number of message attachments present in a given
message. By sending a specially-crafted message containing an overly large
number of message attachments, a remote attacker could exploit this
vulnerability to cause a denial of service condition.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
170974 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

Affected Products and Versions

+--------------------+----------+
|Affected Product(s) |Version(s)|
+--------------------+----------+
|IBM Cloud Private   |3.2.1 CD  |
+--------------------+----------+
|IBM Cloud Private   |3.2.0 CD  |
+--------------------+----------+

Remediation/Fixes

Product defect fixes and security updates are only available for the two most
recent Continuous Delivery (CD) update packages

  o IBM Cloud Private 3.2.0
  o IBM Cloud Private 3.2.1

For IBM Cloud Private 3.2.0, applyMarch fix pack:

  o IBM Cloud Private 3.2.0.2003

For IBM Cloud Private 3.2.1, apply March fix pack:

  o IBM Cloud Private 3.2.1.2003

For IBM Cloud Private 3.1.0, 3.1.1, 3.1.2:

  o Upgrade to the latest Continuous Delivery (CD) update package, IBM Cloud
    Private 3.2.1.
  o If required, individual product fixes can be made available between CD
    update packages for resolution of problems. Contact IBM support for
    assistance

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- ------------------------------------------------------------------------------

IBM Cloud Private is vulnerable to an IBM WebSphere Application Server Liberty
vulnerability (CVE-2019-17495)

Security Bulletin

Summary

IBM Cloud Private is vulnerable to an IBM WebSphere Application Server Liberty
vulnerability

Vulnerability Details

CVEID: CVE-2019-17495
DESCRIPTION: Swagger UI could allow a remote attacker to obtain sensitive
information, caused by a CSS injection flaw. By using the relative path
overwrite (RPO) attack technique, an attacker could exploit this vulnerability
to obtain sensitive information.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169050 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

+--------------------+----------+
|Affected Product(s) |Version(s)|
+--------------------+----------+
|IBM Cloud Private   |3.2.1 CD  |
+--------------------+----------+
|IBM Cloud Private   |3.2.0 CD  |
+--------------------+----------+

Remediation/Fixes

Product defect fixes and security updates are only available for the two most
recent Continuous Delivery (CD) update packages

  o IBM Cloud Private 3.2.0
  o IBM Cloud Private 3.2.1

For IBM Cloud Private 3.2.0, applyMarch fix pack:

  o IBM Cloud Private 3.2.0.2003

For IBM Cloud Private 3.2.1, apply March fix pack:

  o IBM Cloud Private 3.2.1.2003

For IBM Cloud Private 3.1.0, 3.1.1, 3.1.2:

  o Upgrade to the latest Continuous Delivery (CD) update package, IBM Cloud
    Private 3.2.1.
  o If required, individual product fixes can be made available between CD
    update packages for resolution of problems. Contact IBM support for
    assistance

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- ------------------------------------------------------------------------------

IBM Cloud Private is vulnerable to an IBM WebSphere Application Server Liberty
vulnerability (CVE-2019-4720)

Security Bulletin

Summary

IBM Cloud Private is vulnerable to an IBM WebSphere Application Server Liberty
vulnerability

Vulnerability Details

CVEID: CVE-2019-4720
DESCRIPTION: IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is
vulnerable to a denial of service, caused by sending a specially-crafted
request. A remote attacker could exploit this vulnerability to cause the server
to consume all available memory. IBM X-Force ID: 172125.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
172125 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

+--------------------+----------+
|Affected Product(s) |Version(s)|
+--------------------+----------+
|IBM Cloud Private   |3.2.1 CD  |
+--------------------+----------+
|IBM Cloud Private   |3.2.0 CD  |
+--------------------+----------+

Remediation/Fixes

Product defect fixes and security updates are only available for the two most
recent Continuous Delivery (CD) update packages

  o IBM Cloud Private 3.2.0
  o IBM Cloud Private 3.2.1

For IBM Cloud Private 3.2.0, applyMarch fix pack:

  o IBM Cloud Private 3.2.0.2003

For IBM Cloud Private 3.2.1, apply March fix pack:

  o IBM Cloud Private 3.2.1.2003

For IBM Cloud Private 3.1.0, 3.1.1, 3.1.2:

  o Upgrade to the latest Continuous Delivery (CD) update package, IBM Cloud
    Private 3.2.1.
  o If required, individual product fixes can be made available between CD
    update packages for resolution of problems. Contact IBM support for
    assistance

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- ------------------------------------------------------------------------------

Multiple Vulnerabilities in IBM Java Runtime affect IBM Cloud Private

Security Bulletin

Summary

Multiple vulnerabilities in IBM Java Runtime affect IBM Cloud Private

Vulnerability Details

CVEID: CVE-2020-2604
DESCRIPTION: An unspecified vulnerability in Java SE could allow an
unauthenticated attacker to take control of the system.
CVSS Base score: 8.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
174551 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID: CVE-2020-2593
DESCRIPTION: An unspecified vulnerability in Java SE related to the Java SE
Networking component could allow an unauthenticated attacker to cause low
confidentiality impact, low integrity impact, and no availability impact.
CVSS Base score: 4.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
174541 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVEID: CVE-2020-2659
DESCRIPTION: An unspecified vulnerability in Java SE related to the Java SE
Networking component could allow an unauthenticated attacker to cause a denial
of service resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
174606 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2020-2583
DESCRIPTION: An unspecified vulnerability in Java SE related to the Java SE
Serialization component could allow an unauthenticated attacker to cause a
denial of service resulting in a low availability impact using unknown attack
vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
174531 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-4732
DESCRIPTION: IBM SDK, Java Technology Edition Version 7.0.0.0 through
7.0.10.55, 7.1.0.0 through 7.1.4.55, and 8.0.0.0 through 8.0.6.0 could allow a
local authenticated attacker to execute arbitrary code on the system, caused by
DLL search order hijacking vulnerability in Microsoft Windows client. By
placing a specially-crafted file in a compromised folder, an attacker could
exploit this vulnerability to execute arbitrary code on the system. IBM X-Force
ID: 172618.
CVSS Base score: 7.2
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
172618 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H)

Affected Products and Versions

+--------------------+----------+
|Affected Product(s) |Version(s)|
+--------------------+----------+
|IBM Cloud Private   |3.2.1 CD  |
+--------------------+----------+
|IBM Cloud Private   |3.2.0 CD  |
+--------------------+----------+

Remediation/Fixes

Product defect fixes and security updates are only available for the two most
recent Continuous Delivery (CD) update packages

  o IBM Cloud Private 3.2.0
  o IBM Cloud Private 3.2.1

For IBM Cloud Private 3.2.0, apply March fix pack:

  o IBM Cloud Private 3.2.0.2003 fix pack

For IBM Cloud Private 3.2.1, apply March fix pack:

  o IBM Cloud Private 3.2.0.2003 fix pack

For IBM Cloud Private 3.1.0, 3.1.1, 3.1.2:

  o Upgrade to the latest Continuous Delivery (CD) update package, IBM Cloud
    Private 3.2.1.
  o If required, individual product fixes can be made available between CD
    update packages for resolution of problems. Contact IBM support for
    assistance

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- ------------------------------------------------------------------------------

Security Vulnerabilities affect IBM Cloud Private - Node.js (CVE-2019-15605,
CVE-2019-15606)

Security Bulletin

Summary

Security vulnerabilities affect IBM Cloud Private

Vulnerability Details

CVEID: CVE-2019-15605
DESCRIPTION: Node.js is vulnerable to HTTP request smuggling, caused by a flaw
when handling unusual Transfer-Encoding HTTP header. By sending a
specially-crafted request, an attacker could exploit this vulnerability to
poison the web cache, bypass web application firewall protection, and conduct
XSS attacks.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
175913 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVEID: CVE-2019-15606
DESCRIPTION: Node.js could allow a remote attacker to bypass security
restrictions, caused by an issue when HTTP header values do not have trailing
OWS trimmed. By sending a specially-crafted request, an attacker could exploit
this vulnerability to bypass authorization based on header value comparisons.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
175914 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

Affected Products and Versions

+--------------------+----------+
|Affected Product(s) |Version(s)|
+--------------------+----------+
|IBM Cloud Private   |3.2.1 CD  |
+--------------------+----------+
|IBM Cloud Private   |3.2.2 CD  |
+--------------------+----------+

Remediation/Fixes

Product defect fixes and security updates are only available for the two most
recent Continuous Delivery (CD) update packages

  o IBM Cloud Private 3.2.1
  o IBM Cloud Private 3.2.2

For IBM Cloud Private 3.2.1, apply June fix pack:

  o IBM Cloud Private 3.2.1.2006 fix pack

For IBM Cloud Private 3.2.2, apply June fix pack:

  o IBM Cloud Private 3.2.2.2006 fix pack

Additional fixes available for IAM

For IBM Cloud Private 3.2.1, apply Aug fix pack:

  o IBM Cloud Private 3.2.1.2008 fix pack

For IBM Cloud Private 3.2.2, apply Aug fix pack:

  o IBM Cloud Private 3.2.2.2008 fix pack

For IBM Cloud Private 3.1.0, 3.1.1, 3.1.2, 3.2.0:

  o Upgrade to the latest Continuous Delivery (CD) update package, IBM Cloud
    Private 3.2.2.
  o If required, individual product fixes can be made available between CD
    update packages for resolution of problems. Contact IBM support for
    assistance

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBX3E7aONLKJtyKPYoAQgH7BAAi+/dyobwiRVC0MvT0pDKc/aw/8GP5QUR
/F22YxXzKI7IMr0AlOy32f3Mi5DABWskoXefRRI7c0K78hRUz14pvRySAhmdnRlL
ICs4JcXKq/W5dqZapY/fniaOQ6+EmVjXnKe0PGDfZzKkDsTDl2GEnOCZ5r1a1nUc
Hta6X0qYq08nE0GB0fgl09TapsbK3WeFdsEeNShmqWzsYcxlKuZRnhhN+rG8bTH9
gAzgF2HqrkYN4U/EOUUjwpPJ7n/zSccdp6T3YRno51+rm+ddFeRXUERbqfJz0oUq
8w9/8dbg8oT+0xqzYDIJMyFFS+DPRh+7W/2CedwsCV51i6i04mas7uQ4/+rR0Qk/
c8TYgJ23fOeotYFBF8cNwfPcU0hNYmsMhABHZdi/gwdGqqMRPb6EFnD+jy9fpEd2
g4TwySMzS4OEcXolIpiKSAaQFuS7tVt8kFUgh8zBfYHifw3a111uYRJFpuE7zjtn
XXTvI9Ofvc1HMHBdgGtDNaO+MGwp6Ylupd7WJlJvbyHsOhHRUxeneIMdyViNdeHf
63ew9GmDcAIRL3gQKLBeCy8r84cziO123AHuETIioAczHKst9VV4kJhPyLSy/c+L
mfcgGQ2Vu60ZSiKAk3u8Z2WnrFlesQy4HXseVwFUAkN1++4eifdPkFjpucE5Vc+Z
7UfjbUJeezA=
=Jfhj
-----END PGP SIGNATURE-----