IBM Support

Security Bulletin: Multiple vulnerabilities in current IBM SDK for Java for WebSphere Application Server January 2014 CPU

Security Bulletin


Summary

Multiple security vulnerabilities exist in the IBM SDK for Java that is shipped with IBM WebSphere Application Server

Vulnerability Details

The IBM WebSphere Application Server is shipped with an IBM SDK for Java that is based on the Oracle JDK. Oracle has released January 2014 critical patch updates (CPU) which contain security vulnerability fixes. The IBM SDK for Java has been updated to incorporate these fixes.


Vulnerability Details


CVEID: CVE-2014-0411
CVSS Base Score: 4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/90357 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N)

The following advisories are included in the SDK but WebSphere Application Server is not vulnerable to them. You will need to evaluate your own code to determine if you are vulnerable. Please refer to the Reference section for more information on the advisories not applicable to WebSphere Application Server :

CVE-2014-0428 CVE-2014-0422 CVE-2013-5907 CVE-2014-0415 CVE-2014-0410 CVE-2013-5889 CVE-2014-0417 CVE-2014-0387 CVE-2014-0424 CVE-2013-5878 CVE-2014-0373 CVE-2014-0375 CVE-2014-0403 CVE-2014-0423 CVE-2014-0376 CVE-2013-5910 CVE-2013-5884 CVE-2013-5896 CVE-2013-5899 CVE-2014-0416 CVE-2013-5887 CVE-2014-0368 CVE-2013-5888 CVE-2013-5898


Versions affected:

  • SDK shipped with IBM WebSphere Application Server Version 8.5.0.0 through 8.5.5.1, Version 8.0.0.0 through 8.0.0.8, Version 7.0.0.0 through 7.0.0.31, Version 6.1.0.0 through 6.1.0.47
  • This does not occur on SDK versions shipped with WebSphere Application Servers fix pack 8.5.5.2, 8.0.0.9 and 7.0.0.33 or later.


  • Warning:

    For mixed cells that contain WebSphere Application Server version 6.0.2 nodes where Java 2 security is enabled, ensure APAR PM92206 or its circumvention is applied to the Deployment Manager to prevent sync operation failure. PM92206 has been delivered with an Interim Fix or with WebSphere Application Server Fix Packs 8.5.5.1 and 8.0.0.7 and 7.0.0.31.

    Solutions:

    Upgrade your SDK to an interim fix level as determined below:

    For IBM WebSphere Application Server and IBM WebSphere Application Server Hypervisor Edition
    :

    Download and apply the interim fix APARs below, for your appropriate release:


    For V8.5.0.0 through 8.5.5.1 Full Profile:
  • Apply Interim Fix PI08993: Will upgrade you to SDK 7 SR6 FP1

  • --OR-
  • Apply Interim Fix PI08994: Will upgrade you to SDK 6 (J9 2.6) SR7 FP1

  • --OR--
  • Apply IBM SDK for Java shipped with the WebSphere Application Server Fix pack 8.5.5.2 or later. HP Platforms should apply IBM SDK for Java shipped with WebSphere Application Server Fix pack 3 (8.5.5.3) or later.


  • For 8.0.0.0 through 8.0.0.8:
  • Apply Interim Fix PI08995: Will upgrade you to SDK 6 (J9 2.6) SR7 FP1

  • --OR--
  • Apply IBM SDK for Java shipped with WebSphere Application Server Fix pack 9 (8.0.0.9) or later.


  • For V7.0.0.0 through 7.0.0.31:
  • Apply Interim Fix PI08996: Will upgrade you to SDK 6 SR15 FP1

  • --OR--
  • Apply IBM SDK for Java shipped with WebSphere Application Server Fix pack 33 (7.0.0.33) or later.


  • For V6.1.0.0 through 6.1.0.47:
  • Contact IBM Support and apply Interim Fix PI08999: Will upgrade you to SDK 5 SR16 FP5


  • For IBM WebSphere Application Server for i5/OS operating systems:


    The IBM Developer Kit for Java is prerequisite software for WebSphere Application Server for IBM i. Please refer to Java on IBM i for updates on when these fixes will be available.

    Workarounds and Mitigations

    none

    Get Notified about Future Security Bulletins

    Important Note

    IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.

    References

    Off

    Change History

    11 February 2014: Original publish date
    18 February 2014: updated Fix pack dates
    29 April 2014: Fix cvss vector format

    *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

    Disclaimer

    According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

    [{"Product":{"code":"SSEQTP","label":"WebSphere Application Server"},"Business Unit":{"code":"BU004","label":"Hybrid Cloud"},"Component":"Java SDK","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF010","label":"HP-UX"},{"code":"PF012","label":"IBM i"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"},{"code":"PF033","label":"Windows"},{"code":"PF035","label":"z\/OS"}],"Version":"8.5;8.0;7.0;6.1","Edition":"Base;Developer;Express;Network Deployment"}]

    Document Information

    Modified date:
    15 June 2018

    UID

    swg21663938