Skip navigation
Share:|

Last updated: April 4th, 2017 2:25pm (PDT)

 

On March 7th, 2017 the Apache team published a security bulletin for Apache Struts 2. It describes a possible remote code execution vulnerability when performing file upload based on Jakarta Multipart parser.

 

The BMC Application Security is investigating whether any BMC products are impacted by this vulnerability.

 

The table below will be updated periodically to reflect our findings. Please subscribe to this blog post to be notified of updates.

 

BMC Products that do NOT include Struts 2BMC Products that include Struts 2
BMC Atrium Orchestrator (BAO)BMC Service Level Management (SLM):
The SLM Collector Admin UI uses Struts2, however it does not use File Upload based on Jakarta Multipart Parser and is therefore not vulnerable to CVE-2017-5638
BMC Client Management (BCM formerly Footprints Asset Core)
BMC Cloud Lifecycle Management (CLM)
BMC Control-D
BMC Control-M
BMC Database Automation (BDA and BDSDA)
BMC Decision Support for Server Automation (BDSSA)
BMC Discovery (formerly ADDM)
BMC Impact Manager
BMC Innovation Suite
BMC MyIT
BMC Network Automation (BNA and BDSNA)
BMC Pathway Policy Service
BMC Real End User Experience Monitoring (Real EUEM)
BMC Release Lifecycle Management (RLM including RPD and RPM)
BMC Remedy IT Service Management Suite (ITSM)
BMC Remedy Mid-Tier
BMC Remedy Platform
BMC Server Automation (BSA)
BMC Service Request Management (SRM)
BMC SmartIT
BMC TrueSight App Visibility Manager
BMC TrueSight Capacity Optimization (TSCO)
BMC TrueSight Infrastructure Management (TSIM including BPPM)
BMC TrueSight Infrastructure Management (TSIM) - PATROL Agent
BMC TrueSight Infrastructure Management (TSIM) - PATROL Repository
BMC TrueSight Intelligence
BMC TrueSight IT Data Analytics (ITDA)
BMC TrueSight Middleware Administrator (TSMA)
BMC TrueSight Middleware Transaction Monitor (TMTM)
BMC TrueSight Presentation Server (TSPS)
BMC TrueSight Pulse

BMC TrueSight Synthetic Monitor

Share:|

Stephen Hawking, referring to the ancient philosophical paradox of infinite regress, writes in his 1988 book "A Brief History of time" (ISBN 978-0-553-05340-1):

 

A well-known scientist (some say it was Bertrand Russell) once gave a public lecture on astronomy. He described how the earth orbits around the sun and how the sun, in turn, orbits around the center of a vast collection of stars called our galaxy. At the end of the lecture, a little old lady at the back of the room got up and said: "What you have told us is rubbish. The world is really a flat plate supported on the back of a giant tortoise." The scientist gave a superior smile before replying, "What is the tortoise standing on?" "You're very clever, young man, very clever," said the old lady. "But it's turtles all the way down!"

 

I am occasionally asked (typically after an information assurance or IT security group runs an environment scan) why it is that there are clear text passphrases stored in an Apache Tomcat server.xml files. A common security best practice is to keep secrets, well um, secret. How is it, I am asked, that a passphrase used to unlock a keystore that houses sensitive private keys used for secure HTTPS connections is so clearly visible in a configuration file?

 

This is a good question and one that has been debated quite a lot. And my honest answer is - we haven't been able to figure out anything that provides more adequate protection. The reality is that when you encrypt data in a way that enables you to retrieve the original value through decryption you need to use a key (or in the case of Apache Tomcat a passphrase that is used to derive a key that encrypts the keystore). The problem is where and how to secure that key? There are a few approaches we could take:

  1. Don't store it. Prompt a person for it every time you need it.
    Problem: this does not scale nor is it automatic. Multiple servers that need to be spun up and/or restarted frequently cannot rely on human interaction.
  2. Encrypt it and store it (a common suggestion).
    Problem: if I encrypt the passphrase I will need to use yet another key. How do I protect this new key? Turtles all the way down...
  3. Scramble / encode / hide it / hardcode the key.
    Problem: Any form of obfuscation will (a) be shared among all installations of our software, and (b) can be discovered through reverse engineering or less nefariously by the original author of said obfuscation telling someone about it. Once the obfuscation is made public (as often happens) it is just as exposed as the original clear text passphrase.
  4. Store it in a secure hardware-based vault.
    Problem: Those are expensive and unless you have invested in one to solve the greater issues of enterprise key and credential management it is likely overkill.

 

The question then remains: what can you do to protect this clear text passphrase from unauthorized disclosure? There are a set of best practices described both by OWASP and Apache on protecting the server.xml file. The two that I most often recommend are:

  1. Use file level access control or permissions to restrict access to server.xml to the service user running Apache Tomcat.
  2. Monitor server.xml for unauthorized access.

 

I think most security practitioners will agree that security through obscurity is not a good approach as it provides a false sense of security. However, something about leaving clear text passwords in a configuration file just doesn't feel great either. Have you come up with an approach that gives you the proverbial "warm fuzzies"? I would love to hear about it if you have.

Share:|

Latest details from BMC

Last Updated: March 10, 2016 12:40PM CST

 

On March 1, 2016, the OpenSSL Software Foundation released a security advisory detailing seven vulnerabilities and a new attack, referred to as the Decrypting RSA with Obsolete and Weakened eNcryption (DROWN) attack. Of the seven vulnerabilities posted, three are related to the DROWN attack. DROWN exploits weaknesses in SSL version 2 (SSLv2) to enable an attacker to collect and decrypt TLS sessions. A successful attack requires the ability to collect traffic for a server that supports both TLS and SSLv2.

 

Environments that have been configured to disable SSLv2 as well as export grade ciphers are not vulnerable to DROWN. Therefore if you have performed steps to mitigate both the TLS Logjam and POODLE attacks - you are not vulnerable. Additionally, the attack is further deflected by ensuring private certificates are not shared among multiple servers (where one is configured to allow SSLv2 and the other is not).

The products listed in Table 1 below include OpenSSL libraries affected by the OpenSSL DROWN vulnerability. Although they might not be vulnerable to the attack (not used for TLS, or SSLv2 disabled), they have patches or remediation advice available.
Products Which Include Affected OpenSSLRemediation / Patches
BMC MainView Console Automation for zEnterpriseMainView Console Management Cumulative SSL Security Patch 2016.03.07 is available for download on BMC Electronic Product Distribution (EPD).
BMC Discovery (previously ADDM)See BMC Discovery blog in communities.

BMC Control-M/Enterprise Manager

BMC Control-M/Server

BMC Control-M/Agent

V8 and V9

V7

  • Use different private key for each server
The products listed in Table 2 below either do not include OpenSSL libraries or are unaffected by the DROWN vulnerability.
Products that do not include OpenSSLProducts that include OpenSSL, but are not vulnerable
BMC Atrium Orchestrator
BMC Cloud Lifecycle Management
BMC Decision Support for Database Automation

 

BMC Decision Support for Network Automation
BMC MainView for z/OS solutions
BMC IMS for z/OS solutions
(all products and versions)

 

BMC DB2 for z/OS solutions
(all products and versions)
BMC Middleware Automation
BMC TrueSight Middleware Administration

BMC Middleware Management -

Transaction Analytics for WebSphere MQ (StatWatch)

 

BMC Release Process Manager
BMC BladeLogic Client Automation
BMC BladeLogic Portal
BMC AppSight
BMC Identity Management
BMC IT Business Management
BMC Network Automation
BMC Service Desk Express
BMC Service Level Management
BMC TrackIt!
BMC RemedyForce (all versions)
BMC Footprints Service Core/Renoir 12
BMC TrueSight Capacity Optimization prior to v10.5
BMC Event Manager
BMC TrueSight IT Data Analytics
BMC Storage Data Management
BMC Performance Manager for WebSphere Business Integration (WBI)
Aternity for BMC End User Experience Management Console and Agents (all versions)
BMC Education Solution Accelerator (ESA)
Moviri Integration for BMC Capacity Optimization
nlyte Enterprise Edition for BMC Software
Seamless Technologies Event Integration for BMC TrueSight Operations Management
BMC Mobile Device Management (MDM)
Sentry Software Integration for BMC Capacity Optimization
Sentry Software Monitoring for BMC TrueSight Operations Management
Sentry Software Adapters for BMC Atrium Orchestrator
SailPoint Provisioning Engine for BMC Software Solutions
SailPoint Compliance Manager for BMC Software Solutions
SailPoint Lifecycle Manager for BMC Software Solutions
Quindell  OS3 Frameworks for BMC Remedy
BMC Cost Analyzer for zEnterprise
BMC Intelligent Capping for zEnterprise
BMC Subsystem Optimization for zEnterprise
BMC Capacity Optimization for Mainframes

 

Products not listed in Table 1 and Table 2 above are still under investigation. Updates on these products will be posted to this page as they become available.
Recommendations:
   1. BMC products are frequently installed in environments that include infrastructure components that embed the OpenSSL library (e.g. Web Servers, Application Servers, Middleware, etc.). Please check with the vendors of these components to ensure they have been patched or that they are not affected by the OpenSSL DROWN vulnerability.
Share:|

A couple of critical broken authentication vulnerabilities were disclosed to BMC by ERNW Gmbh (an independent research company) and they will be disclosed publicly at the Troopers 2016 conference in Heidelberg on March 16th, 2016. These vulnerabilities allow remote unauthorized access to Linux/Unix RSCD agents using the agents’ RPC API. Windows agents are not affected. For more-detailed information, please see the following Flash Notification.

 

Due to the severity of these findings BMC has published a Knowledge Article with patching information as well as general recommendations for reducing the likelihood of successful exploitation. We strongly recommend that BSA customers follow the instructions within.

Share:|

A security authentication vulnerability involving LDAP authentication was found. This vulnerability allows unauthorized access to the EM GUI server by using the EMAPI. Due to the severity of this vulnerability, BMC has published a knowledge article (requires login) with patching and/or workaround information. We strongly recommend that Control-M customers using LDAP authentication follow the instructions within.

Share:|

Latest details from BMC

Last Updated: February 29, 2016 04:40PM CST

 

BMC Software’s Application Security team is investigating the impact that the OpenSSL security advisory published on January 28th has on the security posture of BMC products and services. The advisory includes a high severity vulnerability (CVE-2016-0701) that can potentially enable attackers to obtain private encryption keys and decipher encrypted communication. It only affects OpenSSL versions in the 1.0.2 branch.
The products listed in Table 1 below include OpenSSL libraries affected by the OpenSSL CVE-2016-0701 vulnerability.
Products Which Include Affected OpenSSLRemediation / Patches
BMC Client Management (BCM) - formerly Footprints Asset Core

v.11.7.0 - patch estimated February 19, 2016

v.12.0 - patch estimated February 26, 2016

v.12.1.0 - patch estimated March 4, 2016

BMC Release Package and Deployment (RPD)Patch estimated March 1, 2016
BMC TrueSight Capacity Optimization 10.5Patch estimated March 1, 2016
Borland Silk Performer Synthetic Transaction MonitoringPatch (10.5 release) estimated May 15, 2016
BMC Patrol for LinuxPatch estimated September 15, 2016
The products listed in Table 2 below either do not include OpenSSL libraries or include OpenSSL libraries unaffected by the OpenSSL CVE-2016-0701 vulnerability.
Products that do not include OpenSSLProducts that include OpenSSL, but are not vulnerable
BMC Atrium OrchestratorBMC Control-M (Server, Agent, Enterprise Manager, and AFT). See article here.
BMC Cloud Lifecycle ManagementBMC Footprints Service Core 11
BMC Decision Support for Database Automation

BMC MainView Console Automation for zEnterprise.

(Advisory: MainView Console Management Cumulative SSL Security Patch 2016.01.29 available for download on BMC Electronic Product Distribution site)

BMC Decision Support for Network AutomationBMC MainView SecureHMC
BMC MainView for z/OS solutionsBMC Server Automation (BSA)
BMC IMS for z/OS solutions
(all products and versions)

BMC Remedy AR System and ITSM Suite 7.6.04, 8.0, 8.1

BMC Remedy AR System and ITSM Suite 9.0, 9.1

BMC DB2 for z/OS solutions
(all products and versions)
BMC Remedy AR System 8.8
BMC Middleware AutomationBMC Atrium Discovery and Dependency Management (ADDM)
BMC TrueSight Middleware AdministrationBMC TrueSight Middleware Transaction Monitor (TMTM)

BMC Middleware Management -

Transaction Analytics for WebSphere MQ (StatWatch)

BMC TrueSight Pulse

BMC TrueSight Intelligence

BMC Release Process ManagerBMC Transaction Management Application Response Time (TMART)
BMC BladeLogic Client AutomationBMC Real End User Experience Monitoring
BMC BladeLogic PortalBMC TrueSight Infrastructure Management
BMC AppSightBMC PATROL Agent
BMC Identity ManagementBMC Performance Manager Portal
BMC IT Business ManagementBMC Active End User Experience Monitoring
BMC Network AutomationBMC Application Diagnostics
BMC Service Desk Express
BMC Service Level Management
BMC TrackIt!
BMC RemedyForce (all versions)
BMC Footprints Service Core/Renoir 12
BMC TrueSight Capacity Optimization prior to v10.5
BMC Event Manager
BMC TrueSight IT Data Analytics
BMC Storage Data Management
BMC Performance Manager for WebSphere Business Integration (WBI)
Aternity for BMC End User Experience Management Console and Agents (all versions)
BMC Education Solution Accelerator (ESA)
Moviri Integration for BMC Capacity Optimization
nlyte Enterprise Edition for BMC Software
Seamless Technologies Event Integration for BMC TrueSight Operations Management
BMC Mobile Device Management (MDM)
Sentry Software Integration for BMC Capacity Optimization
Sentry Software Monitoring for BMC TrueSight Operations Management
Sentry Software Adapters for BMC Atrium Orchestrator
SailPoint Provisioning Engine for BMC Software Solutions
SailPoint Compliance Manager for BMC Software Solutions
SailPoint Lifecycle Manager for BMC Software Solutions
Quindell  OS3 Frameworks for BMC Remedy
BMC Cost Analyzer for zEnterprise
BMC Intelligent Capping for zEnterprise
BMC Subsystem Optimization for zEnterprise
BMC Capacity Optimization for Mainframes

 

Products not listed in Table 1 and Table 2 above are still under investigation. Updates on these products will be posted to this page as they become available.
Recommendations:
   1. BMC products are frequently installed in environments that include infrastructure components that embed the OpenSSL library (e.g. Web Servers, Application Servers, Middleware, etc.). Please check with the vendors of these components to ensure they have been patched or that they are not affected by the OpenSSL CVE-2016-0701 vulnerability.

Filter Blog

By date:
By tag: