Lucene search

K
ibmIBM623D51A6E55F06E457D5584F603A4E61CB4FD4631740B86339BBB50B1A1C3544
HistoryAug 29, 2018 - 2:13 a.m.

Security Bulletin:Vulnerabilities in IBM Java SDK affecting IBM Application Delivery Intelligence V5.0.5 and V5.0.4 (CVE-2018-2579, CVE-2018-2588, CVE-2018-2663, CVE-2018-2603)

2018-08-2902:13:40
www.ibm.com
4

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

Summary

Multiple vulnerabilities are identified in IBM® SDK Java™ Technology Edition Version 1.7 and Version 1.8 that are used by IBM Application Delivery Intelligence V5.0.4 and V5.0.5 respectively. These issues were disclosed as part of the IBM Java SDK updates in January 2018.

Vulnerability Details

CVEID: CVE-2018-2579
DESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java SE, Java SE Embedded, JRockit Libraries component could allow an unauthenticated attacker to obtain sensitive information resulting in a low confidentiality impact using unknown attack vectors.
CVSS Base Score: 3.7
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/137833&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2018-2588
DESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java SE, Java SE Embedded, JRockit LDAP component could allow an authenticated attacker to obtain sensitive information resulting in a low confidentiality impact using unknown attack vectors.
CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/137841&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2018-2663
DESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java SE, Java SE Embedded, JRockit Libraries component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors.
CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/137917&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)

CVEID: CVE-2018-2603
DESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java SE, Java SE Embedded, JRockit Libraries component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors.
CVSS Base Score: 5.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/137855&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

Affected Products and Versions

IBM Application Delivery Intelligence V5.0.4

IBM Application Delivery Intelligence V5.0.5

Remediation/Fixes

Customers need to perform the following steps to apply the fix:

  1. Obtain the latest Java JRE CPU update for the IBM Java SDK by using the following information:
* [ADI 5.0.5, Java 1.8 Linux](&lt;https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Rational&product=ibm/Rational/IBM+Application+Delivery+Intelligence&release=5.0.5.0&platform=Linux&function=all&gt;)
* [ADI 5.0.5, Java 1.8 Windows](&lt;https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Rational&product=ibm/Rational/IBM+Application+Delivery+Intelligence&release=5.0.5.0&platform=Windows&function=all&gt;)
* [ADI 5.0.4, Java 1.7 Linux](&lt;https://www-945.ibm.com/support/fixcentral/swg/selectFixes?product=ibm%2FRational%2FIBM+Application+Delivery+Intelligence&fixids=5.0.4_ADI_jre_fp1_linux&source=SAR&function=fixId&parent=ibm/Rational&gt;)
* [ADI 5.0.4, Java 1.7 Windows](&lt;http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FRational%2FIBM+Application+Delivery+Intelligence&fixids=5.0.4_ADI_jre_fp1_windows&source=SAR&gt;)
  1. If you are running ADI V5.0.5, skip this step. For V5.0.4, complete the following substeps.
    1. Stop the server**.** Navigate to the server directory in your Rational product installation path and run this script: server.shutdown
    2. Modify the healthcenter parameter set.
    • Navigate to the server directory in your Rational product installation path, open the server.startup script by using your preferred text editor (e.g., Notepad for Windows or Vim Editor for Linux).
    • Search parameter -Dcom.ibm.java.diagnostics.healthcenter.agent in the server.startup script to find the line that contains the healthcenter parameter.
      NOTE: For some Rational Collaborative Lifecycle Management versions,_ -Dcom.ibm.java.diagnostics.healthcenter.agent_ parameter may not be found in the server.startup, in this case the update is not needed and you can start using your server.
    • Windows:
      Comment out the line (where the HEALTHCENTER_OPTS parameter is located) by inserting "rem " at the beginning of the line:

Before modification:
set HEALTHCENTER_OPTS=-agentlib:healthcenter **_…

After modification:_ **
rem set HEALTHCENTER_OPTS=-agentlib:healthcenter …
* Linux:
Comment out the line (where the HEALTHCENTER_OPTS parameter is located) by inserting "# " at the beginning of the line:

Before modification:
export HEALTHCENTER_OPTS="-agentlib:healthcenter **_…

After modification:_ **
# export HEALTHCENTER_OPTS="-agentlib:healthcenter …
3. Start the server**.** Navigate to the server directory in your Rational product installation path and run this script: server.startup
3. Upgrade your JRE by following the instructions in the link below:
How to update the IBM SDK for Java of IBM Rational products based on version 3.0.1.6 or later of IBM’s Jazz technology
4. Navigate to the server directory in your Rational product installation path, and go to jre/lib/security path.

1. Open the `java.security` file by using your preferred text editor (e.g., Notepad for Windows or Vim Editor for Linux).

2. Remove the MD5 option from the _jdk.jar.disabledAlgorithms_ parameter set:

  * **_Before modification:_**  

jdk.jar.disabledAlgorithms=MD2, MD5, RSA keySize < 1024

  * **_After modification:_**  

jdk.jar.disabledAlgorithms=MD2, RSA keySize < 1024

Workarounds and Mitigations

None

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P