News
Abstract
These vulnerabilities are only applicable to Java deployments where untrusted code may be executed under a security manager (e.g. Java applets running in a web browser).
Content
DESCRIPTION:
There are a number of vulnerabilities in the IBM JAVA SDK that affect various components (ORB, XML and JMX). The vulnerabilities allow code running under a security manager to escalate its privileges by modifying or removing the security manager. Some of the issues need to be combined in sequence to achieve an exploit.
The vulnerabilities could occur when the IBM JRE is installed as the system JRE, such that it may be used to execute untrusted Java applets or Web Start applications in a browser.
VULNERABILITY DETAILS:
CVE ID | DESCRIPTION | CVSS |
CVE-2012-1531 | Unspecified vulnerability in JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D | 10 |
CVE-2012-1532 | Unspecified vulnerability in the JRE allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment | 10 |
CVE-2012-1533 | Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment | 10 |
CVE-2012-3143 | Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability, related to JMX | 10 |
CVE-2012-3159 | Unspecified vulnerability in the Java Runtime Environment (JRE) allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment | 7.5 |
CVE-2012-3216 | Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries | 2.6 |
CVE-2012-4820 | Unspecified vulnerability in the JRE component allows remote attackers to execute arbitrary code on the system. | 9.3 |
CVE-2012-4821 | Unspecified vulnerability in the JRE component allows remote attackers to execute arbitrary code on the system. | 9.3 |
CVE-2012-4822 | Unspecified vulnerability in the JRE component allows remote attackers to execute arbitrary code on the system. | 9.3 |
CVE-2012-4823 | Unspecified vulnerability in the JRE component allows remote attackers to execute arbitrary code on the system. | 9.3 |
CVE-2012-5068 | Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries | 7.5 |
CVE-2012-5069 | Unspecified vulnerability in JRE component allows remote attackers to affect confidentiality and integrity via unknown vectors related to Concurrency | 5.8 |
CVE-2012-5071 | Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality and integrity, related to JMX | 6.4 |
CVE-2012-5072 | Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality via unknown vectors related to Security | 5 |
CVE-2012-5073 | Unspecified vulnerability in the JRE component allows remote attackers to affect integrity via unknown vectors related to Libraries | 5 |
CVE-2012-5075 | Unspecified vulnerability in the JRE allows remote attackers to affect confidentiality, related to JMX | 5 |
CVE-2012-5079 | Unspecified vulnerability in the JRE component allows remote attackers to affect integrity via unknown vectors related to Libraries | 5 |
CVE-2012-5083 | Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D | 10 |
CVE-2012-5084 | Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing | 7.6 |
CVE-2012-5089 | Unspecified vulnerability in the JRE component allows remote attackers to affect confidentiality, integrity, and availability, related to JMX | 7.6 |
For the most current description and CVSS for each vulnerability, please refer to developerWorks JavaTM Technology Security Alerts
AFFECTED PRODUCTS AND VERSIONS:
IBM Tivoli Monitoring version 6.2.3 through 6.2.3 Fix Pack 02
IBM Tivoli Monitoring version 6.2.2 through 6.2.2 Fix Pack 09
IBM Tivoli Monitoring version 6.2.1 through 6.2.1 Fix Pack 04
IBM Tivoli Monitoring version 6.2.0 through 6.2.0 Fix Pack 03
REMEDIATION:
This vulnerability exists where the affected JRE is installed on systems running the Tivoli Enterprise Portal Browser client or Java WebStart client. The affected JRE is installed on a system when logging into the IBM Tivoli Enterprise Portal using the Browser client or WebStart client and a JRE at the required level does not exist. The portal provides an option to download the provided JRE to the system. |
The fix below provides a server side JRE package for customers to install on the portal server. This is a scripted solution to update the portal JRE bundles that are provided to the end user. The fix upgrades the JRE to 1.6.0 SR12.
Fix | VRMF | APAR | How to acquire fix |
6.2-TIV-ITM_JRE-LA0002 | 6.2.0 through 6.23 FP2 | IV30922-Sever | http://www-01.ibm.com/support/docview.wss?uid=swg2033801 |
The Fix Pack listed below will include the IV30922-Server fix listed above.
Fix | VRMF | APAR | How to acquire fix |
6.2.3-TIV-ITM-FP0003 | 6.2.3.0 | IV30922-Sever | http://www-01.ibm.com/support/docview.wss?uid=swg24033803 Refer to the link above for status on availability. |
Workaround(s):
None.
Mitigation(s):
None.
REFERENCES:
· Complete CVSS Guide
· On-line Calculator V2
· X-Force Vulnerability Database
RELATED INFORMATION:
http://seclists.org/bugtraq/2012/Sep/38
ACKNOWLEDGEMENT
The vulnerability was reported to IBM by Adam Gowdiak of Security Explorations.
CHANGE HISTORY
November 13, 2012 Advisory Flash Created
December 13, 2012 Updated Flash to document additional CVE's included in the provided JRE package.
May 15, 2016 Updated expiration date for document.
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.
Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
Product Synonym
ITM TEP
Was this topic helpful?
Document Information
Modified date:
25 September 2022
UID
swg21616490