IBM Support

Security Bulletin: IBM Tivoli Monitoring clients affected by vulnerabilities in IBM JRE excuted under a security manager.

News


Abstract

These vulnerabilities are only applicable to Java deployments where untrusted code may be executed under a security manager (e.g. Java applets running in a web browser).

Content


DESCRIPTION:
There are a number of vulnerabilities in the IBM JAVA SDK that affect various components (ORB, XML and JMX). The vulnerabilities allow code running under a security manager to escalate its privileges by modifying or removing the security manager. Some of the issues need to be combined in sequence to achieve an exploit.

The vulnerabilities could occur when the IBM JRE is installed as the system JRE, such that it may be used to execute untrusted Java applets or Web Start applications in a browser.


VULNERABILITY DETAILS:

CVE IDDESCRIPTIONCVSS
CVE-2012-1531Unspecified vulnerability in JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D10
CVE-2012-1532Unspecified vulnerability in the JRE allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment10
CVE-2012-1533Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment10
CVE-2012-3143Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability, related to JMX10
CVE-2012-3159Unspecified vulnerability in the Java Runtime Environment (JRE) allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment7.5
CVE-2012-3216Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries2.6
CVE-2012-4820Unspecified vulnerability in the JRE component allows remote attackers to execute arbitrary code on the system. 9.3
CVE-2012-4821Unspecified vulnerability in the JRE component allows remote attackers to execute arbitrary code on the system. 9.3
CVE-2012-4822Unspecified vulnerability in the JRE component allows remote attackers to execute arbitrary code on the system. 9.3
CVE-2012-4823Unspecified vulnerability in the JRE component allows remote attackers to execute arbitrary code on the system. 9.3
CVE-2012-5068Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries7.5
CVE-2012-5069Unspecified vulnerability in JRE component allows remote attackers to affect confidentiality and integrity via unknown vectors related to Concurrency5.8
CVE-2012-5071Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality and integrity, related to JMX6.4
CVE-2012-5072Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality via unknown vectors related to Security5
CVE-2012-5073Unspecified vulnerability in the JRE component allows remote attackers to affect integrity via unknown vectors related to Libraries5
CVE-2012-5075Unspecified vulnerability in the JRE allows remote attackers to affect confidentiality, related to JMX5
CVE-2012-5079Unspecified vulnerability in the JRE component allows remote attackers to affect integrity via unknown vectors related to Libraries5
CVE-2012-5083Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D10
CVE-2012-5084Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing7.6
CVE-2012-5089Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability, related to JMX7.6

For the most current description and CVSS for each vulnerability, please refer to developerWorks JavaTM Technology Security Alerts


AFFECTED PRODUCTS AND VERSIONS:
IBM Tivoli Monitoring version 6.2.3 through 6.2.3 Fix Pack 02
IBM Tivoli Monitoring version 6.2.2 through 6.2.2 Fix Pack 09
IBM Tivoli Monitoring version 6.2.1 through 6.2.1 Fix Pack 04
IBM Tivoli Monitoring version 6.2.0 through 6.2.0 Fix Pack 03


REMEDIATION:
This vulnerability exists where the affected JRE is installed on systems running the Tivoli Enterprise Portal Browser client or Java WebStart client.

The affected JRE is installed on a system when logging into the IBM Tivoli Enterprise Portal using the Browser client or WebStart client and a JRE at the required level does not exist. The portal provides an option to download the provided JRE to the system.

The fix below provides a server side JRE package for customers to install on the portal server. This is a scripted solution to update the portal JRE bundles that are provided to the end user. The fix upgrades the JRE to 1.6.0 SR12.

FixVRMFAPARHow to acquire fix
6.2-TIV-ITM_JRE-LA00026.2.0 through 6.23 FP2IV30922-Sever http://www-01.ibm.com/support/docview.wss?uid=swg2033801

The Fix Pack listed below will include the IV30922-Server fix listed above.
FixVRMFAPARHow to acquire fix
6.2.3-TIV-ITM-FP00036.2.3.0IV30922-Sever http://www-01.ibm.com/support/docview.wss?uid=swg24033803
Refer to the link above for status on availability.


Workaround(s):
None.

Mitigation(s):
None.

REFERENCES:
· Complete CVSS Guide
· On-line Calculator V2
· X-Force Vulnerability Database


RELATED INFORMATION:
http://seclists.org/bugtraq/2012/Sep/38

ACKNOWLEDGEMENT
The vulnerability was reported to IBM by Adam Gowdiak of Security Explorations.

CHANGE HISTORY
November 13, 2012 Advisory Flash Created
December 13, 2012 Updated Flash to document additional CVE's included in the provided JRE package.
May 15, 2016 Updated expiration date for document.


*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.


Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{"Product":{"code":"SSTFXA","label":"Tivoli Monitoring"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":"Not Applicable","Platform":[{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"}],"Version":"6.2.3;6.2.2;6.2.1;6.2.0","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Product Synonym

ITM TEP

Document Information

Modified date:
25 September 2022

UID

swg21616490