IBM Support

Security Bulletin: Multiple vulnerabilities in IBM® Java SDK affect WebSphere Application Server October 2015 CPU (CVE-2015-4872, CVE-2015-4734, CVE-2015-5006)

Security Bulletin


Summary

There are multiple vulnerabilities in IBM® SDK Java™ Technology Edition that is shipped with IBM WebSphere Application Server. These issues were disclosed as part of the IBM Java SDK updates in October2015. These may affect some configurations of IBM WebSphere Application Server Full Profile, IBM WebSphere Application Server Liberty Profile, and IBM WebSphere Application Server Hypervisor Edition.

Vulnerability Details

DESCRIPTION: This bulletin covers all applicable Java SE CVE's published by Oracle as part of their October 2015 Critical Patch Update and an additional vulnerability which affects IBM SDK, Java Technology Edition. There are other advisories included in the IBM Java SDK but WebSphere Application Server is not vulnerable to them. You will need to evaluate your own code to determine if you are vulnerable. Please refer to the Reference section for more information on the advisories not applicable to WebSphere Application Server.

CVEID: CVE-2015-4872
DESCRIPTION:
 An unspecified vulnerability related to the Security component has no confidentiality impact, partial integrity impact, and no availability impact.
CVSS Base Score: 5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/107361 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVEID: CVE-2015-4734
DESCRIPTION:
 An unspecified vulnerability related to the JGSS component could allow a remote attacker to obtain sensitive information.
CVSS Base Score: 5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/107356 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVEID: CVE-2015-5006
DESCRIPTION:
 IBM Java Security Components could allow an attacker with physical access to the system to obtain sensitive information from the Kerberos Credential Cache.
CVSS Base Score: 4.6
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/106309 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

IBM Java SDK shipped with IBM WebSphere Application Server Version 8.5.0.0 through 8.5.5.8, Version 8.0.0.0 through 8.0.0.11, Version 7.0.0.0 through 7.0.0.39, Version 6.1.0.0 through 6.1.0.47

  • This does not occur on IBM Java SDK shipped with WebSphere Application Servers Fix Packs 8.5.5.9, 8.0.0.12 and 7.0.0.41 or later.

Remediation/Fixes

For V8.5.0.0 through 8.5.5.7 Liberty Profile:

Upgrade to WebSphere Application Server Liberty Profile Fix Packs as noted below or later fix pack level and apply one of the interim fixes below:

  • Upgrade to WebSphere Application Server Liberty Profile Fix Pack 8.5.5.1 or later then apply Interim Fix PI51441: Will upgrade you to IBM SDK, Java Technology Edition, Version 6R1 Service Refresh 8 Fix Pack 15
  • Upgrade to WebSphere Application Server Liberty Profile Fix Pack 8.5.5.1 or later then apply Interim Fix PI51439: Will upgrade you to IBM SDK, Java Technology Edition, Version 7 Service Refresh 9 Fix Pack 20
  • Upgrade to WebSphere Application Server Liberty Profile Fix Pack 8.5.5.2 or later then apply Interim Fix PI51438: Will upgrade you to IBM SDK, Java Technology Edition, Version 7R1 Service Refresh 3 Fix Pack 20
  • Upgrade to WebSphere Application Server Liberty Profile Fix Pack 8.5.5.1 or later then apply Interim Fix PI51436: Will upgrade you to IBM SDK, Java Technology Edition, Version 8 Service Refresh 2
--OR--
  • Apply IBM Java SDK shipped with WebSphere Application Server Fix pack 9 (8.5.5.9) or later.

For V8.5.0.0 through 8.5.5.7 Full Profile:

Upgrade to WebSphere Application Server Full Profile Fix Packs as noted below or later fix pack level and then apply one of the interim fixes below:

  • Upgrade to WebSphere Application Server Full Profile Fix Pack 8.5.5.1 or later then apply Interim Fix PI51440: Will upgrade you to IBM SDK, Java Technology Edition, Version 6R1 Service Refresh 8 Fix Pack 15 (required)
  • Upgrade to WebSphere Application Server Full Profile Fix Pack 8.5.5.1 or later then apply Interim Fix PI51439: Will upgrade you to IBM SDK, Java Technology Edition, Version 7 Service Refresh 9 Fix Pack 20 (optional)
  • Upgrade to WebSphere Application Server Full Profile Fix Pack 8.5.5.2 or later then apply Interim Fix PI51438: Will upgrade you to IBM SDK, Java Technology Edition, Version 7R1 Service Refresh 3 Fix Pack 20 (optional)
--OR--
  • Apply IBM Java SDK shipped with the WebSphere Application Server Fix pack 9 (8.5.5.9) or later.


For V8.0.0.0 through 8.0.0.11:

Upgrade to WebSphere Application Server Fix Pack 8.0.0.7 or later then apply the interim fix below:

  • Apply Interim Fix PI51442: Will upgrade you to IBM SDK, Java Technology Edition, Version 6R1 Service Refresh 8 Fix Pack 15
--OR--
  • Apply IBM Java SDK shipped with WebSphere Application Server Fix pack 12 (8.0.0.12) or later.

For V7.0.0.0 through 7.0.0.39:

Upgrade to WebSphere Application Server Fix Pack 7.0.0.31 or later then apply the interim fix below:

  • Apply Interim Fix PI51444: Will upgrade you to IBM SDK, Java Technology Edition, Version 6 Service Refresh 16 Fix Pack 15
--OR--
  • Apply IBM Java SDK shipped with WebSphere Application Server Fix pack 41 (7.0.0.41) or later.

For V6.1.0.0 through 6.1.0.47:

Upgrade to WebSphere Application Server Fix Pack 6.1.0.47

  • Then apply Interim Fix PI51445: Will upgrade you to IBM SDK, Java 2 Technology Edition, Version 5.0 Service Refresh 16 Fix Pack 14

Workarounds and Mitigations

none

Get Notified about Future Security Bulletins

Important Note

IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.

References

Off

Change History

18 November 2015: original document published
13 January 2015: removed required/optional for Liberty
15 March 2015: HP fixes available

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{"Product":{"code":"SSEQTP","label":"WebSphere Application Server"},"Business Unit":{"code":"BU004","label":"Hybrid Cloud"},"Component":"Java SDK","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF010","label":"HP-UX"},{"code":"PF012","label":"IBM i"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"},{"code":"PF033","label":"Windows"},{"code":"PF035","label":"z\/OS"}],"Version":"8.5.5;8.5;8.0;7.0;6.1","Edition":"Base;Developer;Enterprise;Express;Liberty;Network Deployment"},{"Product":{"code":"SSCKBL","label":"WebSphere Application Server Hypervisor Edition"},"Business Unit":{"code":"BU004","label":"Hybrid Cloud"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"","Edition":""},{"Product":{"code":"SSD28V","label":"WebSphere Application Server Liberty Core"},"Business Unit":{"code":"BU004","label":"Hybrid Cloud"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"","Edition":""}]

Document Information

Modified date:
15 June 2018

UID

swg21969620