IBM Support

Security Bulletin: Multiple Vulnerabilities in IBM Java SDK affect IBM Notes Standard Client

Security Bulletin


Summary

There are multiple vulnerabilities in IBM® SDK Java™ Technology Edition, Version 6 SR16FP20 that is used by IBM Notes Standard Client. These issues were disclosed as part of the IBM Java SDK updates in April 2016.

Vulnerability Details


CVEID: CVE-2016-3443
DESCRIPTION:
 An unspecified vulnerability in Oracle Java SE related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact.


CVEID:  CVE-2016-0687
DESCRIPTION:
 An unspecified vulnerability in Oracle Java SE and Java SE Embedded related to the Hotspot component has complete confidentiality impact, complete integrity impact, and complete availability impact.
CVEID:  CVE-2016-0686
DESCRIPTION:
An unspecified vulnerability in Oracle Java SE and Java SE Embedded related to the Serialization component has complete confidentiality impact, complete integrity impact, and complete availability impact.
CVEID:  CVE-2016-3427
DESCRIPTION:
 An unspecified vulnerability in Oracle Java SE and Java SE Embedded related to the Serialization component has complete confidentiality impact, complete integrity impact, and complete availability impact.
CVEID:  CVE-2016-3449
DESCRIPTION:
 An unspecified vulnerability in Oracle Java SE related to the Deployment component has complete confidentiality impact, complete integrity impact, and complete availability impact.
CVEID:  CVE-2016-3425
DESCRIPTION:
 An unspecified vulnerability in Oracle Java SE Java, SE Embedded and JRockit related to the JAXP component could allow a remote attacker to cause a denial of service resulting in a partial availability impact using unknown attack vectors.
CVEID:  CVE-2016-3422
DESCRIPTION:
 An unspecified vulnerability in Oracle Java SE related to the 2D component could allow a remote attacker to cause a denial of service resulting in a partial availability impact using unknown attack vectors.
CVEID:  CVE-2016-0695
DESCRIPTION:
 An unspecified vulnerability in Oracle Java SE Java SE Embedded and JRockit related to the Security component could allow a remote attacker to obtain sensitive information resulting in a partial confidentiality impact using unknown attack vectors.
CVEID:  CVE-2016-3426
DESCRIPTION:
 An unspecified vulnerability in Oracle Java SE and Java SE Embedded related to the JCE component could allow a remote attacker to obtain sensitive information resulting in a partial confidentiality impact using unknown attack vectors.
CVEID:  CVE-2016-0636
DESCRIPTION:
Oracle Java SE could allow a remote attacker to execute arbitrary code on the system, caused by an error in the desktop and browser plug-in versions of the software. By persuading a victim to visit a specially crafted web site, an attacker could exploit this vulnerability to gain complete control of the system.
CVEID:  CVE-2016-0264
DESCRIPTION:
 A buffer overflow vulnerability in the IBM JVM facilitates arbitrary code execution under certain limited circumstances.
CVEID:  CVE-2016-0363
DESCRIPTION:
 IBM SDK, Java Technology Edition contains a vulnerability in the IBM ORB implementation that may allow untrusted code running under a security manager to elevate its privileges. This vulnerability was originally reported as CVE-2013-3009.
CVEID:  CVE-2016-0376
DESCRIPTION:
 A vulnerability in IBM Java SDK could allow a remote attacker to execute arbitrary code on the system. This vulnerability allows code running under a security manager to escalate its privileges by modifying or removing the security manager. This vulnerability was originally reported as CVE-2013-5456.

Affected Products and Versions


IBM Notes Standard Client 9.0.1 through Notes Standard Client 9.0.1 FP6
IBM Notes Standard Client 8.5.3 through Notes Standard Client 8.5.3 FP6IF10
All 9.0 and 8.5.x releases of IBM Notes Standard Client prior to those listed above

Remediation/Fixes

IBM Notes Standard Client - Multiple vulnerabilities in IBM Java 6 SR16FP20 affect IBM Notes Standard Client are also tracked as SPR KLYHA9KMNR. Refer to the JVM tab in the technotes linked below for download links to a single standalone Java patch that addresses these vulnerabilities.



Customers who remain on the following releases may open a Service Request with IBM Support and reference SPRs KLYHA9KMNR for a custom hotfix:
  • IBM Notes Standard Client 9.0.1 through Notes Standard Client 9.0.1 FP5 IF3
  • IBM Notes Standard Client 9.0.0x
  • IBM Notes Standard Client 8.5.3 through Notes Standard Client 8.5.3 FP4 IF2
  • IBM Notes Standard Client 8.5.2x
  • IBM Notes Standard Client 8.5.1x

Workarounds and Mitigations

The only solution is to upgrade JRE.

Get Notified about Future Security Bulletins

References

Related information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

14 June 2016: Initial Publication
06 July 2016: Correction in custom hotfix section. Replaced "Notes Standard Client 8.5.3 FP6IF10" reference with "Notes Standard Client 8.5.3 FP4 IF2".
11 July 2016: Corrected CVE-ID descriptions

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Document information

More support for: IBM Notes
Security

Software version: 8.5, 8.5.1, 8.5.2, 8.5.3, 9.0, 9.0.1

Operating system(s): Linux, Windows

Reference #: 1983686

Modified date: 11 July 2016