Lucene search

K
ibmIBM35B519C9AD0203686FFA0D63C303032AD85ECAE43883B9B27299F5601C6E2197
HistoryJun 15, 2018 - 6:59 a.m.

Security Bulletin: Multiple vulnerabilities in current IBM SDK for Java for WebSphere Application Server January 2014 CPU

2018-06-1506:59:28
www.ibm.com
8

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

Summary

Multiple security vulnerabilities exist in the IBM SDK for Java that is shipped with IBM WebSphere Application Server

Vulnerability Details

The IBM WebSphere Application Server is shipped with an IBM SDK for Java that is based on the Oracle JDK. Oracle has released January 2014 critical patch updates (CPU) which contain security vulnerability fixes. The IBM SDK for Java has been updated to incorporate these fixes.

**
Vulnerability Details **

CVEID: CVE-2014-0411
CVSS Base Score: 4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/90357 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N)
** **The following advisories are included in the SDK but WebSphere Application Server is not vulnerable to them. You will need to evaluate your own code to determine if you are vulnerable. Please refer to the Reference section for more information on the advisories not applicable to WebSphere Application Server :

CVE-2014-0428 CVE-2014-0422 CVE-2013-5907 CVE-2014-0415 CVE-2014-0410 CVE-2013-5889 CVE-2014-0417 CVE-2014-0387 CVE-2014-0424 CVE-2013-5878 CVE-2014-0373 CVE-2014-0375 CVE-2014-0403 CVE-2014-0423 CVE-2014-0376 CVE-2013-5910 CVE-2013-5884 CVE-2013-5896 CVE-2013-5899 CVE-2014-0416 CVE-2013-5887 CVE-2014-0368 CVE-2013-5888 CVE-2013-5898

**
Versions affected:**

  • SDK shipped with IBM WebSphere Application Server Version 8.5.0.0 through 8.5.5.1, Version 8.0.0.0 through 8.0.0.8, Version 7.0.0.0 through 7.0.0.31, Version 6.1.0.0 through 6.1.0.47
  • This does not occur on SDK versions shipped with WebSphere Application Servers fix pack 8.5.5.2, 8.0.0.9 and 7.0.0.33 or later.

**
Warning: **
For mixed cells that contain WebSphere Application Server version 6.0.2 nodes where Java 2 security is enabled, ensure APAR PM92206 or its circumvention is applied to the Deployment Manager to prevent sync operation failure. PM92206 has been delivered with an Interim Fix or with WebSphere Application Server Fix Packs 8.5.5.1 and 8.0.0.7 and 7.0.0.31.
**
Solutions: **
Upgrade your SDK to an interim fix level as determined below:
_
For IBM WebSphere Application Server and IBM WebSphere Application Server Hypervisor Edition_
:

Download and apply the interim fix APARs below, for your appropriate release:

**
For V8.5.0.0 through 8.5.5.1 Full Profile:**

  • Apply Interim Fix PI08993: Will upgrade you to SDK 7 SR6 FP1

--OR-

  • Apply Interim Fix PI08994: Will upgrade you to SDK 6 (J9 2.6) SR7 FP1

--OR–

  • Apply IBM SDK for Java shipped with the WebSphere Application Server Fix pack 8.5.5.2 or later. HP Platforms should apply IBM SDK for Java shipped with WebSphere Application Server Fix pack 3 (8.5.5.3) or later.

**
For 8.0.0.0 through 8.0.0.8:**

  • Apply Interim Fix PI08995: Will upgrade you to SDK 6 (J9 2.6) SR7 FP1

--OR–

  • Apply IBM SDK for Java shipped with WebSphere Application Server Fix pack 9 (8.0.0.9) or later.

**
For V7.0.0.0 through 7.0.0.31:**

  • Apply Interim Fix PI08996: Will upgrade you to SDK 6 SR15 FP1

--OR–

  • Apply IBM SDK for Java shipped with WebSphere Application Server Fix pack 33 (7.0.0.33) or later.

**
For V6.1.0.0 through 6.1.0.47:**

  • Contact IBM Support and apply Interim Fix PI08999: Will upgrade you to SDK 5 SR16 FP5

_
For IBM WebSphere Application Server for i5/OS operating systems:_
** **
The IBM Developer Kit for Java is prerequisite software for WebSphere Application Server for IBM i. Please refer to Java on IBM i for updates on when these fixes will be available.

Workarounds and Mitigations

none

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C