Lucene search

K
ibmIBM1F2F1CB65E265B60CBD764981B767523532E4F8B6262F717906EA7945B91F6F1
HistorySep 25, 2022 - 11:13 p.m.

Security Bulletin: IBM Tivoli Monitoring clients affected by vulnerabilities in IBM JRE excuted under a security manager.

2022-09-2523:13:40
www.ibm.com
7

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.829 High

EPSS

Percentile

98.4%

Abstract

These vulnerabilities are only applicable to Java deployments where untrusted code may be executed under a security manager (e.g. Java applets running in a web browser).

Content

DESCRIPTION:
There are a number of vulnerabilities in the IBM JAVA SDK that affect various components (ORB, XML and JMX). The vulnerabilities allow code running under a security manager to escalate its privileges by modifying or removing the security manager. Some of the issues need to be combined in sequence to achieve an exploit.

The vulnerabilities could occur when the IBM JRE is installed as the system JRE, such that it may be used to execute untrusted Java applets or Web Start applications in a browser.

VULNERABILITY DETAILS:

CVE ID DESCRIPTION **CVSS **
CVE-2012-1531 Unspecified vulnerability in JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D 10
CVE-2012-1532 Unspecified vulnerability in the JRE allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment 10
CVE-2012-1533 Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment 10
CVE-2012-3143 Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability, related to JMX 10
CVE-2012-3159 Unspecified vulnerability in the Java Runtime Environment (JRE) allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment 7.5
CVE-2012-3216 Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries 2.6
CVE-2012-4820 Unspecified vulnerability in the JRE component allows remote attackers to execute arbitrary code on the system. 9.3
CVE-2012-4821 Unspecified vulnerability in the JRE component allows remote attackers to execute arbitrary code on the system. 9.3
CVE-2012-4822 Unspecified vulnerability in the JRE component allows remote attackers to execute arbitrary code on the system. 9.3
CVE-2012-4823 Unspecified vulnerability in the JRE component allows remote attackers to execute arbitrary code on the system. 9.3
CVE-2012-5068 Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries 7.5
CVE-2012-5069 Unspecified vulnerability in JRE component allows remote attackers to affect confidentiality and integrity via unknown vectors related to Concurrency 5.8
CVE-2012-5071 Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality and integrity, related to JMX 6.4
CVE-2012-5072 Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality via unknown vectors related to Security 5
CVE-2012-5073 Unspecified vulnerability in the JRE component allows remote attackers to affect integrity via unknown vectors related to Libraries 5
CVE-2012-5075 Unspecified vulnerability in the JRE allows remote attackers to affect confidentiality, related to JMX 5
CVE-2012-5079 Unspecified vulnerability in the JRE component allows remote attackers to affect integrity via unknown vectors related to Libraries 5
CVE-2012-5083 Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D 10
CVE-2012-5084 Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing 7.6
CVE-2012-5089 Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability, related to JMX 7.6

For the most current description and CVSS for each vulnerability, please refer to developerWorks Java__TM_ Technology Security Alerts_

AFFECTED PRODUCTS AND VERSIONS:
IBM Tivoli Monitoring version 6.2.3 through 6.2.3 Fix Pack 02
IBM Tivoli Monitoring version 6.2.2 through 6.2.2 Fix Pack 09
IBM Tivoli Monitoring version 6.2.1 through 6.2.1 Fix Pack 04
IBM Tivoli Monitoring version 6.2.0 through 6.2.0 Fix Pack 03

REMEDIATION: This vulnerability exists where the affected JRE is installed on systems running the Tivoli Enterprise Portal Browser client or Java WebStart client.

The affected JRE is installed on a system when logging into the IBM Tivoli Enterprise Portal using the Browser client or WebStart client and a JRE at the required level does not exist. The portal provides an option to download the provided JRE to the system.

The fix below provides a server side JRE package for customers to install on the portal server. This is a scripted solution to update the portal JRE bundles that are provided to the end user. The fix upgrades the JRE to 1.6.0 SR12.

Fix VRMF APAR How to acquire fix
6.2-TIV-ITM_JRE-LA0002 6.2.0 through 6.23 FP2 IV30922-Sever http://www-01.ibm.com/support/docview.wss?uid=swg2033801
The Fix Pack listed below will include the IV30922-Server fix listed above. Fix VRMF APAR How to acquire fix
6.2.3-TIV-ITM-FP0003 6.2.3.0 IV30922-Sever http://www-01.ibm.com/support/docview.wss?uid=swg24033803
Refer to the link above for status on availability.

Workaround(s):
None.

Mitigation(s):
None.

REFERENCES:
ยท Complete CVSS Guide
ยท On-line Calculator V2_ _
ยท X-Force Vulnerability Database

RELATED INFORMATION:
<http://seclists.org/bugtraq/2012/Sep/38&gt;

ACKNOWLEDGEMENT
The vulnerability was reported to IBM by Adam Gowdiak of Security Explorations.

CHANGE HISTORY
November 13, 2012 Advisory Flash Created
_December 13, 2012 Updated Flash to document additional CVEโ€™s included in the provided JRE package. _
May 15, 2016 Updated expiration date for document.

_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _

_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an โ€œindustry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.โ€ IBM PROVIDES THE CVSS SCORES โ€œAS ISโ€ WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{โ€œProductโ€:{โ€œcodeโ€:โ€œSSTFXAโ€,โ€œlabelโ€:โ€œTivoli Monitoringโ€},โ€œBusiness Unitโ€:{โ€œcodeโ€:โ€œBU059โ€,โ€œlabelโ€:โ€œIBM Software w/o TPSโ€},โ€œComponentโ€:โ€œNot Applicableโ€,โ€œPlatformโ€:[{โ€œcodeโ€:โ€œPF016โ€,โ€œlabelโ€:โ€œLinuxโ€},{โ€œcodeโ€:โ€œPF033โ€,โ€œlabelโ€:โ€œWindowsโ€}],โ€œVersionโ€:โ€œ6.2.3;6.2.2;6.2.1;6.2.0โ€,โ€œEditionโ€:โ€œโ€,โ€œLine of Businessโ€:{โ€œcodeโ€:โ€œLOB45โ€,โ€œlabelโ€:โ€œAutomationโ€}}]

Product Synonym

ITM TEP

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.829 High

EPSS

Percentile

98.4%