Direct links to fixes
APAR status
Closed as program error.
Error description
A vulnerability in IBM SDK Java Technology Edition affects the desktop IBM Process Designer for IBM Business Automation Workflow. CVEID: CVE-2019-4732 DESCRIPTION: IBM SDK, Java Technology Edition Version could allow a local authenticated attacker to execute arbitrary code on the system, caused by DLL search order hijacking vulnerability in Microsoft Windows client. By placing a specially-crafted file in a compromised folder, an attacker could exploit this vulnerability to execute arbitrary code on the system. CVSS Base score: 7.2 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/172618 for the current score. CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H)
Local fix
Problem summary
No additional information is available. PRODUCTS AFFECTED IBM Business Automation Workflow IBM Business Process Manager (BPM) Advanced IBM BPM Standard IBM BPM Express
Problem conclusion
A fix that resolves CVE-2019-4732 in Process Designer is available for the latest fix pack for IBM BPM V8.5.7, IBM BPM V8.6, Business Automation Workflow V19.0.0.2, V19.0.0.3, and is planned for inclusion in a future release of Business Automation Workflow.
Temporary fix
Comments
APAR Information
APAR number
JR61918
Reported component name
BUS AUTO WORKFL
Reported component ID
5737H4100
Reported release
K00
Status
CLOSED PER
PE
NoPE
HIPER
NoHIPER
Special Attention
NoSpecatt / Xsystem
Submitted date
2020-02-03
Closed date
2020-03-24
Last modified date
2020-03-24
APAR is sysrouted FROM one or more of the following:
APAR is sysrouted TO one or more of the following:
Fix information
Fixed component name
BUS AUTO WORKFL
Fixed component ID
5737H4100
Applicable component levels
[{"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Product":{"code":"SS8JB4","label":"IBM Business Automation Workflow"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"20.0.0.1","Line of Business":{"code":"LOB45","label":"Automation"}}]
Document Information
Modified date:
22 June 2020