Lucene search

K
ibmIBMAD8E83B84BF33E4577A1D24CA6F2F237A0256DC3326C80B484D27451A6A17B82
HistoryJun 15, 2018 - 7:06 a.m.

Security Bulletin: Potential security vulnerability in WebSphere Application Server MQ JCA Resource adapter (CVE-2016-0360)

2018-06-1507:06:53
www.ibm.com
4

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Summary

There is a potential security vulnerability with the WebSphere Application Server MQ JCA Resource adapter.

Vulnerability Details

CVEID: CVE-2016-0360**
DESCRIPTION:** IBM Websphere MQ JMS 7.0.1, 7.1, 7.5, 8.0, and 9.0 client provides classes that deserialize objects from untrusted sources which could allow a malicious user to execute arbitrary Java code by adding vulnerable classes to the classpath.
CVSS Base Score: 8.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/111930 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

This vulnerability affects the following versions and releases of IBM WebSphere Application Server traditional:

  • Version 9.0
  • Version 8.5 and Version 8.5.5
  • Version 8.0
  • Version 7.0

Remediation/Fixes

The recommended solution is to apply the interim fix, Fix Pack or PTF containing the APAR for each named product as soon as practical. After applying the Interim Fix or moving up to the fix pack level with fix, follow the ClassName allowlisting instructions in the Reference section**.**** **

For WebSphere Application Server traditional and WebSphere Application Server Hypervisor edition:
**
For V9.0.0.0 through 9.0.0.2:**
ยท Upgrade to Fix Pack 9.0.0.1 or later and then apply Interim Fix PI74874 and then follow instructions in reference section to apply ClassName serialization allowlisting.
--ORโ€“
ยท Apply Fix Pack 9.0.0.3 or later and then follow instructions in reference section to apply ClassName serialization allowlisting.
**
For V8.5.0.0 through 8.5.5.11:**
ยท Upgrade to Fix Pack Level 8.5.5.9 or later and then apply Interim Fix PI74862 and then follow instructions in reference section to apply ClassName serialization allowlisting.
--ORโ€“
ยท Apply Fix Pack 8.5.5.12 or later and then follow instructions in reference section to apply ClassName serialization allowlisting.
**
For V8.0.0.0 through 8.0.0.13:**
ยท Upgrade to Fix Pack 8.0.0.12 or later and then apply Interim Fix PI74468 and then follow instructions in reference section to apply ClassName serialization allowlisting.
--ORโ€“
ยท Apply Fix Pack 8.0.0.14 or later and then follow instructions in reference section to apply ClassName serialization allowlisting.
**
For V7.0.0.0 through 7.0.0.41:**
ยท Upgrade to Fix Pack 7.0.0.41 and then apply Interim Fix PI74468 and then follow instructions in reference section to apply ClassName serialization allowlisting.
--ORโ€“
ยท Apply Fix Pack 7.0.0.43 or later and then follow instructions in reference section to apply ClassName serialization allowlisting.

Workarounds and Mitigations

IBM WebSphere MQ supports Object Messages as part of the JMS specification, however ObjectMessage usage is discouraged. To mitigate this vulnerability, message types that do not contain this security flaw, such as JSON or XML, should be used. To ensure that messages come from recognized senders, a security mechanism, such as MQโ€™s AMS (Advanced Message Security), can be used.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Related for AD8E83B84BF33E4577A1D24CA6F2F237A0256DC3326C80B484D27451A6A17B82