-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.2253
          Security Bulletin: Multiple vulnerabilities in IBM HTTP
                Server used by WebSphere Application Server
                               29 June 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           WebSphere Application Server
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   Linux
                   Solaris
                   Windows
                   z/OS
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-26691 CVE-2021-26690 

Reference:         ESB-2021.2229
                   ESB-2021.2196

Original Bulletin: 
   https://www.ibm.com/support/pages/node/6467651

- --------------------------BEGIN INCLUDED TEXT--------------------

Multiple vulnerabilities  in  IBM HTTP Server used by WebSphere Application
Server

Document Information

Document number    : 6467651
Modified date      : 28 June 2021
Product            : IBM HTTP Server
Software version   : 9.0
Operating system(s): AIX
                     HP-UX
                     Linux
                     Solaris
                     Windows
                     z/OS
Edition            : Base,Enterprise,Advanced,Single Server,Network Deployment

Summary

There are multiple vulnerabilities in the IBM HTTP Server used by WebSphere
Application Server. This has been addressed.

Vulnerability Details

CVEID: CVE-2021-26691
DESCRIPTION: Apache HTTP Server is vulnerable to a heap-based buffer overflow,
caused by improper bounds checking by the mod_session. By sending a specially
crafted SessionHeader, a remote attacker could overflow a buffer and cause a
denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
203465 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2021-26690
DESCRIPTION: Apache HTTP Server is vulnerable to a denial of service, caused by
a NULL pointer dereference. A remote attacker could exploit this vulnerability
using a specially crafted Cookie header handled by mod_session to cause the
system to crash.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
203464 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

Affected Products and Versions

This vulnerability affects the following version and release of IBM HTTP Server
(powered by Apache) component in all editions of WebSphere Application Server
and bundling products.

+--------------------+----------+
|Affected Product(s) |Version(s)|
+--------------------+----------+
|IBM HTTP Server     |9.0       |
+--------------------+----------+

Remediation/Fixes

For IBM HTTP Server used by WebSphere Application Server:

For V9.0.0.0 through 9.0.0.10:
. Upgrade to minimal fix pack levels as required by interim fix and then apply
Interim Fix PH06010 .
- --OR--
. Apply Fix Pack 9.0.0.11 or later.

Additional interim fixes may be available and linked off the interim fix
download page.

Important Note

IBM strongly suggests that all System z customers be subscribed to the System z
Security Portal to receive the latest critical System z security and
integrity service. If you are not subscribed, see the instructions on the
System z Security web site. Security and integrity APARs and associated fixes
will
be posted to this portal. IBM suggests reviewing the CVSS scores and applying
all security or integrity fixes as soon as possible to minimize any potential
risk.

Workarounds and Mitigations

None

Acknowledgement

Change History

28 Jun 2021: Initial Publication

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=0kmQ
-----END PGP SIGNATURE-----