Lucene search

K
ibmIBME095FC03096261FE55986EF4F402EA0A700BEE11F22BFA669379C13D2E1BC33B
HistoryJun 17, 2018 - 3:23 p.m.

Security Bulletin: Multiple security vulnerabilities has been identified in Websphere Application Server shipped with Tivoli Integrated Portal (CVE-2016-3426, CVE-2016-3427)

2018-06-1715:23:24
www.ibm.com
13

9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

Summary

Embedded Websphere Application Server (eWAS) is shipped as a component of Tivoli Integrated Portal. Information about a security vulnerability affecting Embedded Websphere Application Server has been published in a security bulletin.

Vulnerability Details

Please consult the WAS security bulletin Security Bulletin: Multiple vulnerabilities in IBM® Java SDK affect WebSphere Application Server April 2016 CPU (CVE-2016-3426, CVE-2016-3427) for vulnerability details

Important Note: The Websphere security bulletin above provides the vulnerability details including the steps to remediate. However, it is important to review the**“Remediation/Fixes”** section below before reviewing the Websphere bulletin to ensure the TIP specific remediation steps are understood and followed.

Affected Products and Versions

Tivoli Integrated Portal version 2.1 and 2.2 bundling Embedded Websphere Application Server version 7.0

Remediation/Fixes

The Websphere security bulletin above provides a link to the required iFix to remediate the vulnerability. However, the iFix requires either eWAS 7.0.0.31 or higher installed.
TIP does not support upgrading Websphere fixpack independently. TIP 2.2.0.15 or TIP 2.2.0.17 must be applied which will upgrade eWAS to 7.0.0.31 and above. Once TIP FP has been applied, the Websphere iFix can be applied as described in the Websphere bulletin.

Workarounds and Mitigations

None

9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C