4.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.829 High
EPSS
Percentile
98.4%
These vulnerabilities are only applicable to Java deployments where untrusted code may be executed under a security manager (e.g. Java applets running in a web browser).
DESCRIPTION:
There are a number of vulnerabilities in the IBM JAVA SDK that affect various components (ORB, XML and JMX). The vulnerabilities allow code running under a security manager to escalate its privileges by modifying or removing the security manager. Some of the issues need to be combined in sequence to achieve an exploit.
The vulnerabilities could occur when the IBM JRE is installed as the system JRE, such that it may be used to execute untrusted Java applets or Web Start applications in a browser.
VULNERABILITY DETAILS:
CVE ID | DESCRIPTION | **CVSS ** |
---|---|---|
CVE-2012-1531 | Unspecified vulnerability in JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D | 10 |
CVE-2012-1532 | Unspecified vulnerability in the JRE allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment | 10 |
CVE-2012-1533 | Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment | 10 |
CVE-2012-3143 | Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability, related to JMX | 10 |
CVE-2012-3159 | Unspecified vulnerability in the Java Runtime Environment (JRE) allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment | 7.5 |
CVE-2012-3216 | Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries | 2.6 |
CVE-2012-4820 | Unspecified vulnerability in the JRE component allows remote attackers to execute arbitrary code on the system. | 9.3 |
CVE-2012-4821 | Unspecified vulnerability in the JRE component allows remote attackers to execute arbitrary code on the system. | 9.3 |
CVE-2012-4822 | Unspecified vulnerability in the JRE component allows remote attackers to execute arbitrary code on the system. | 9.3 |
CVE-2012-4823 | Unspecified vulnerability in the JRE component allows remote attackers to execute arbitrary code on the system. | 9.3 |
CVE-2012-5068 | Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries | 7.5 |
CVE-2012-5069 | Unspecified vulnerability in JRE component allows remote attackers to affect confidentiality and integrity via unknown vectors related to Concurrency | 5.8 |
CVE-2012-5071 | Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality and integrity, related to JMX | 6.4 |
CVE-2012-5072 | Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality via unknown vectors related to Security | 5 |
CVE-2012-5073 | Unspecified vulnerability in the JRE component allows remote attackers to affect integrity via unknown vectors related to Libraries | 5 |
CVE-2012-5075 | Unspecified vulnerability in the JRE allows remote attackers to affect confidentiality, related to JMX | 5 |
CVE-2012-5079 | Unspecified vulnerability in the JRE component allows remote attackers to affect integrity via unknown vectors related to Libraries | 5 |
CVE-2012-5083 | Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D | 10 |
CVE-2012-5084 | Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing | 7.6 |
CVE-2012-5089 | Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability, related to JMX | 7.6 |
For the most current description and CVSS for each vulnerability, please refer to developerWorks Java__TM_ Technology Security Alerts_
AFFECTED PRODUCTS AND VERSIONS:
IBM Tivoli Monitoring version 6.2.3 through 6.2.3 Fix Pack 02
IBM Tivoli Monitoring version 6.2.2 through 6.2.2 Fix Pack 09
IBM Tivoli Monitoring version 6.2.1 through 6.2.1 Fix Pack 04
IBM Tivoli Monitoring version 6.2.0 through 6.2.0 Fix Pack 03
REMEDIATION: This vulnerability exists where the affected JRE is installed on systems running the Tivoli Enterprise Portal Browser client or Java WebStart client.
The fix below provides a server side JRE package for customers to install on the portal server. This is a scripted solution to update the portal JRE bundles that are provided to the end user. The fix upgrades the JRE to 1.6.0 SR12.
Fix | VRMF | APAR | How to acquire fix |
---|---|---|---|
6.2-TIV-ITM_JRE-LA0002 | 6.2.0 through 6.23 FP2 | IV30922-Sever | http://www-01.ibm.com/support/docview.wss?uid=swg2033801 |
The Fix Pack listed below will include the IV30922-Server fix listed above. Fix | VRMF | APAR | How to acquire fix |
---|---|---|---|
6.2.3-TIV-ITM-FP0003 | 6.2.3.0 | IV30922-Sever | http://www-01.ibm.com/support/docview.wss?uid=swg24033803 |
Refer to the link above for status on availability. |
Workaround(s):
None.
Mitigation(s):
None.
REFERENCES:
ยท Complete CVSS Guide
ยท On-line Calculator V2_ _
ยท X-Force Vulnerability Database
RELATED INFORMATION:
<http://seclists.org/bugtraq/2012/Sep/38>
ACKNOWLEDGEMENT
The vulnerability was reported to IBM by Adam Gowdiak of Security Explorations.
CHANGE HISTORY
November 13, 2012 Advisory Flash Created
_December 13, 2012 Updated Flash to document additional CVEโs included in the provided JRE package. _
May 15, 2016 Updated expiration date for document.
_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _
_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an โindustry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.โ IBM PROVIDES THE CVSS SCORES โAS ISโ WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
[{โProductโ:{โcodeโ:โSSTFXAโ,โlabelโ:โTivoli Monitoringโ},โBusiness Unitโ:{โcodeโ:โBU059โ,โlabelโ:โIBM Software w/o TPSโ},โComponentโ:โNot Applicableโ,โPlatformโ:[{โcodeโ:โPF016โ,โlabelโ:โLinuxโ},{โcodeโ:โPF033โ,โlabelโ:โWindowsโ}],โVersionโ:โ6.2.3;6.2.2;6.2.1;6.2.0โ,โEditionโ:โโ,โLine of Businessโ:{โcodeโ:โLOB45โ,โlabelโ:โAutomationโ}}]
ITM TEP
CPE | Name | Operator | Version |
---|---|---|---|
tivoli monitoring | eq | 6.2.3 | |
tivoli monitoring | eq | 6.2.2 | |
tivoli monitoring | eq | 6.2.1 | |
tivoli monitoring | eq | 6.2.0 |
4.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.829 High
EPSS
Percentile
98.4%