IBM Support

Potential security vulnerabilities with JavaTM SDKs

Flashes (Alerts)


Abstract

Security Bulletin: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. See Vulnerability Details for CVE IDs.

Content

VULNERABILITY DETAILS:

Customers who have Java based applications, such as Maximo Asset Management, Maximo Industry Solutions, Tivoli Asset Management for IT, Tivoli Service Request Manager, Change and Configuration Management Database, SmartCloud Control Desk, Intelligent Building Management, or TRIRIGA for Energy Optimization are potentially impacted by these vulnerabilities, which can cause issues related to confidentiality, integrity, and availability. For additional information including the most current description and CVSS for each vulnerability, please refer to developerWorks JavaTM Technology Security Alerts.

CVE IDDESCRIPTIONCVSS
CVE-2012-1531Unspecified vulnerability in JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D10
CVE-2012-1532Unspecified vulnerability in the JRE allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment10
CVE-2012-1533Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment10
CVE-2012-3143Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability, related to JMX10
CVE-2012-3159Unspecified vulnerability in the Java Runtime Environment (JRE) allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment7.5
CVE-2012-3216Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries2.6
CVE-2012-4416Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality and integrity via unknown vectors related to Hotspot6.4
CVE-2012-5067Unspecified vulnerability in JRE component allows remote attackers to affect confidentiality via unknown vectors related to Deployment5
CVE-2012-5068Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries7.5
CVE-2012-5069Unspecified vulnerability in JRE component allows remote attackers to affect confidentiality and integrity via unknown vectors related to Concurrency5.8
CVE-2012-5070Unspecified vulnerability in the JRE component in allows remote attackers to affect confidentiality, related to JMX5
CVE-2012-5071Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality and integrity, related to JMX6.4
CVE-2012-5072Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality via unknown vectors related to Security5
CVE-2012-5073Unspecified vulnerability in the JRE component allows remote attackers to affect integrity via unknown vectors related to Libraries5
CVE-2012-5074Unspecified vulnerability in the JRE component in allows remote attackers to affect confidentiality and integrity, related to JAX-WS6.4
CVE-2012-5075Unspecified vulnerability in the JRE allows remote attackers to affect confidentiality, related to JMX5
CVE-2012-5076Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability, related to JAX-WS10
CVE-2012-5077Unspecified vulnerability JRE component allows remote attackers to affect confidentiality via unknown vectors related to Security2.6
CVE-2012-5079Unspecified vulnerability in the JRE component allows remote attackers to affect integrity via unknown vectors related to Libraries5
CVE-2012-5081Unspecified vulnerability in the JRE component allows remote attackers to affect availability, related to JSSE5
CVE-2012-5083Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D10
CVE-2012-5084Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing7.6
CVE-2012-5086Unspecified vulnerability in JRE allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans10
CVE-2012-5087Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans10
CVE-2012-5088Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries10
CVE-2012-5089Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability, related to JMX7.6

The developerWorks JavaTM Technology Security Alerts includes a link to Oracle's October 16 2012 Critical Patch Update.

VERSIONS AFFECTED:

The following Oracle Java versions, which are not IBM products, are affected:


· Java SE JDK and JRE Version 7 Update 7 and earlier

· Java SE JDK and JRE Version 6 Update 35 and earlier

· Java SEJDK and JRE Version 5 Update 36 and earlier

· Java SE JDK and JRE Version 1.4.2_38 and earlier


The following IBM Java versions are affected:
· IBM SDK Java Technology Edition Version 7

· IBM SDK Java Technology Edition Version 6

· IBM SDK Java Technology Edition Version 5

· IBM SDK Java Technology Edition Version 1.4.2

IBM supplied the Java Runtime Environment (JRE) from the IBM SDK Java Technology Edition Versions with the following:

The 6.x versions of Maximo Asset Management, Maximo Asset Management Essentials, Maximo for Government, Maximo for Nuclear Power, Maximo for Transportation, Maximo for Life Sciences, Maximo for Oil and Gas, and Maximo for Utilities, Tivoli Asset Management for IT, and Maximo Service Desk bundled JRE Version 1.4.2.

The 7.1 versions of Maximo Asset Management, Maximo Asset Management Essentials, Maximo for Government, Maximo for Nuclear Power, Maximo for Transportation, Maximo for Life Sciences, Maximo for Oil and Gas, Maximo for Utilities, Tivoli Asset Management for IT, Tivoli Service Request Manager, and Tivoli Change and Configuration Management Database bundled JRE Version 5.

The 7.2 versions of Tivoli Asset Management for IT, Tivoli Service Request Manager, and Tivoli Change and Configuration Management Database bundled JRE Version 5.

The 7.5 versions of Maximo Asset Management, Maximo Asset Management Essentials, Maximo for Government, Maximo for Nuclear Power, Maximo for Transportation, Maximo for Life Sciences, Maximo for Oil and Gas, Maximo for Utilities, and SmartCloud Control Desk 7.5 bundled JRE Version 6.

Intelligent Building Management 1.1 and TRIRIGA for Energy Optimization 1.2 bundled JRE Version 6.

It is likely that earlier versions of affected products are also affected by these vulnerabilities. Remediation is not provided for product versions that are no longer supported. IBM recommends that customers upgrade to the latest supported version of products in order to obtain remediation for the vulnerabilities.

REMEDIATION:



There are two areas where the vulnerabilities in the Java SDK/JDK or JRE may require remediation:
1. Application Server – Update the Websphere Application Server. Refer to JDK Fixes for Websphere Application Server for additional information on updating and maintaining the JDK component within Websphere. Customers with Oracle Weblogic Server, which is not an IBM product and is not shipped by IBM, will also want to update their server.
2. Browser Client - Update the Java plug-in used by the browser on client systems, using the remediated JRE version referenced on developerWorks JavaTM Technology Security Alerts or referenced on Oracle’s October 16 2012 Critical Patch Update (which can be accessed via developerWorks JavaTM Technology Security Alerts. Updating the browser Java plug-in may impact some applets such as Maximo Asset Management Scheduler. Download from IBM FixCentral the latest Maximo Asset Management Scheduler Interim Fix for Version 7.1 or the latest Maximo Asset Management Fix Pack for Version 7.5, which includes the resolution for APAR IV11560.

Due to the threat posed by a successful attack, IBM strongly recommends that customers apply fixes as soon as possible.

WORKAROUND:
Until you apply the fixes, it may be possible to reduce the risk of successful attack by restricting network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from unprivileged users may help reduce the risk of successful attack. Both approaches may break application functionality, so IBM strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.

REFERENCES:
Complete CVSS Guide
On-line Calculator V2
CVE-2012-1531
CVE-2012-1532
CVE-2012-1533
CVE-2012-3143
CVE-2012-3159
CVE-2012-3216
CVE-2012-4416
CVE-2012-5067
CVE-2012-5068
CVE-2012-5069
CVE-2012-5070
CVE-2012-5071
CVE-2012-5072
CVE-2012-5073
CVE-2012-5074
CVE-2012-5075
CVE-2012-5076
CVE-2012-5077
CVE-2012-5079
CVE-2012-5081
CVE-2012-5083
CVE-2012-5084
CVE-2012-5086
CVE-2012-5087
CVE-2012-5089

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.

Note:
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
Change History
08 Jan 2013Flash published

CROSS REFERENCE INFORMATION:

SegmentProductComponent/PlatformVersion
Systems and Asset ManagementMaximo Asset ManagementAll6.2.0 – 6.2.8
7.1.1.0 – 7.1.1.10
7.5.0.0 – 7.5.0.3
Systems and Asset ManagementMaximo Asset Management EssentialsAll7.1.1.0 – 7.1.1.10
7.5.0.0 – 7.5.0.3
Systems and Asset ManagementMaximo Asset Management for Energy OptimizationAll7.1.0.0 – 7.1.1.0
Systems and Asset ManagementMaximo for GovernmentAll6.1.0.0
7.1.0.0
7.5.0.0
Systems and Asset ManagementMaximo for Nuclear PowerAll6.3.0
7.1.0.0 – 7.1.1.0
Systems and Asset ManagementMaximo for TransportationAll6.3.0
7.1.0.0 – 7.1.1.0
7.5.0.0
Systems and Asset ManagementMaximo for Life SciencesAll6.4.0 – 6.5.0
7.1.0.0 – 7.1.2.0
7.5.00
Systems and Asset ManagementMaximo for Oil and GasAll6.3.0 – 6.4.0
7.1.0.0 – 7.1.2.0
7.5.0.0
Systems and Asset ManagementMaximo for UtilitiesAll6.3.0
7.1.0.0 – 7.1.2.0
7.5.0.0
Systems and Asset ManagementTivoli Service Request Manager

Maximo Service Desk
All7.1.0.0 – 7.1.1.10
7.2.0.0 – 7.2.1.3
6.2.0 – 6.2.8
Systems and Asset ManagementTivoli Asset Management for IT All6.2.0 – 6.2.8
7.1.0.0 – 7.1.1.10
7.2.0.0 – 7.2.2.1
Systems and Asset ManagementChange and Configuration Management DatabaseAll7.1.0.0 – 7.1.1.10
7.2.0.0 – 7.2.1.2
Systems and Asset ManagementIntelligent Building ManagementAll1.1.0.0
Systems and Asset ManagementTRIRIGA for Energy OptimizationAll1.2.0.0
Systems and Asset ManagementSmartCloud Control DeskAll7.5.0.0 – 7.5.0.1

[{"Product":{"code":"SSLKT6","label":"IBM Maximo Asset Management"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":"--","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"6.2;6.2.1;6.2.2;6.2.3;6.2.4;6.2.5;6.2.6;6.2.7;6.2.8;7.1;7.1.1;7.1.2;7.2;7.2.1;7.5","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}},{"Product":{"code":"SSWK4A","label":"Maximo Asset Management Essentials"},"Business Unit":{"code":"BU055","label":"Cognitive Applications"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}},{"Product":{"code":"SSU3T4","label":"Maximo Asset Management for Energy Optimization"},"Business Unit":{"code":"BU055","label":"Cognitive Applications"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}},{"Product":{"code":"SSMQTP","label":"Maximo for Government"},"Business Unit":{"code":"BU055","label":"Cognitive Applications"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}},{"Product":{"code":"SSLL8M","label":"Maximo for Nuclear Power"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}},{"Product":{"code":"SSLL9Z","label":"Maximo for Transportation"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}},{"Product":{"code":"SSLL84","label":"Maximo for Life Sciences"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}},{"Product":{"code":"SSLL9G","label":"Maximo for Oil and Gas"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}},{"Product":{"code":"SSLLAM","label":"Maximo for Utilities"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}},{"Product":{"code":"SS6HJK","label":"Tivoli Service Request Manager"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}},{"Product":{"code":"SSLKTY","label":"Maximo Asset Management for IT"},"Business Unit":{"code":"BU053","label":"Cloud \u0026 Data Platform"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}},{"Product":{"code":"SSKTXT","label":"Tivoli Change and Configuration Management Database"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}},{"Product":{"code":"SSWDVU","label":"IBM TRIRIGA Energy Optimization"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}},{"Product":{"code":"SSWT9A","label":"IBM Control Desk"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}}]

Document Information

Modified date:
25 September 2022

UID

swg21621899