IBM Support

Security Bulletin: Vulnerability in IBM Java SDK affecting IBM Application Discovery and Delivery Intelligence V5.1.0.8, V5.1.0.9 and V6.0.0.0

Security Bulletin


Summary

Vulnerability was identified in IBM® SDK Java™ Technology Edition Version 1.8 that is used by IBM Application Discovery and Delivery Intelligence V5.1.0.8, V5.1.0.9 and V6.0.0.0 respectively. This issue was disclosed in the Oracle April 2021 Critical Patch Update.

Vulnerability Details

CVEID:   CVE-2021-2161
DESCRIPTION:   An unspecified vulnerability in Java SE related to the Libraries component could allow an unauthenticated attacker to cause no confidentiality impact, high integrity impact, and no availability impact.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/200290 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)

Affected Products and Versions

Affected Product(s)Version(s)
IBM Application Discovery and Delivery Intelligence5.1.0.8 - 6.0.0.0

Remediation/Fixes

Customers need to perform the following steps to apply the fix:

  1. Shutdown the IBM ADDI Extensions server
  2. Navigate to the IBM ADDI Extensions install directory and rename the JRE folder
           <ADDI Install Dir>/IBM Application Discovery and Delivery Intelligence Extensions/adi<version>/server/jre 
            to 
           <ADDI Install Dir>/IBM Application Discovery and Delivery Intelligence Extensions/adi<version>/server/jre-original
  3. This will ensure that the original JRE is kept as a backup if a restore is required
  4. Download the new IBM JRE fix pack for the appropriate operating system from ADDI fix pack IBM JRE 8.0.6.31
  5. Extract the new IBM JRE fix pack downloaded above to the IBM ADDI Extensions install directory
           <ADDI Install Dir>/IBM Application Discovery and Delivery Intelligence Extensions/adi<version>/server/
  6. Restart the IBM ADDI Extensions server
  7. Confirm that IBM ADDI Extensions server has startup up successfully and all components are working as expected
  8. Once confirmed, you can now delete the JRE folder that you backed up in Step 2 above
           <ADDI Install Dir>/IBM Application Discovery and Delivery Intelligence Extensions/adi<version>/server/jre-original

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Change History

14 Jun 2021: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Product":{"code":"SSDQSP","label":"IBM Application Discovery and Delivery Intelligence"},"Component":"","Platform":[{"code":"PF033","label":"Windows"},{"code":"PF016","label":"Linux"},{"code":"PF051","label":"Linux on IBM Z Systems"}],"Version":"5.1.0.9","Edition":""},{"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Product":{"code":"SSDQSP","label":"IBM Application Discovery and Delivery Intelligence"},"Component":"","Platform":[{"code":"PF016","label":"Linux"},{"code":"PF051","label":"Linux on IBM Z Systems"},{"code":"PF033","label":"Windows"}],"Version":"6.0.0","Edition":""},{"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Product":{"code":"SSDQSP","label":"IBM Application Discovery and Delivery Intelligence"},"Component":"","Platform":[{"code":"PF033","label":"Windows"},{"code":"PF016","label":"Linux"},{"code":"PF051","label":"Linux on IBM Z Systems"}],"Version":"5.1.0.8","Edition":""}]

Document Information

Modified date:
15 June 2021

Initial Publish date:
14 June 2021

UID

ibm16463959