Fix (APAR): PI66849 Status: Fix Release: 8.5.5.9,8.5.5.8,8.5.5.7 Operating System: AIX,HP-UX,IBM i,Linux,Solaris,Windows,z/OS Supersedes Fixes: CMVC Defect: xxxxxx Byte size of APAR: 10813543 Date: 2016-08-15 Abstract: Multiple vulnerabilities associated with IBM HTTP Server. Description/symptom of problem: PI66849 resolves the following problems: ERROR DESCRIPTION: The "expat" XML parsing library bundled with IHS has several input-related vulnerabilities, and the HTTPOXY vulnerability also affects IHS. This PI66849 interim fix also includes fixes for PI63098 and PI65855. LOCAL FIX: PROBLEM SUMMARY: The IHS related vulnerabilities resolved by this interim fix are: CVEID: CVE-2012-0876 DESCRIPTION: Expat is vulnerable to a denial of service, caused by insufficient randomization of hash data structures. CVEID: CVE-2012-1148 DESCRIPTION: Expat is vulnerable to a denial of service, caused by a memory leak in poolGrow when handling XML data. CVEID: CVE-2016-4472 DESCRIPTION: Expat XML parser is vulnerable to a denial of service, caused by the removal by compilers with certain optimization settings. CVEID: CVE-2016-0718 DESCRIPTION: Expat XML parser is vulnerable to a denial of service, caused by an out-of-bounds read within XML parser. CVEID: CVE-2016-5387 DESCRIPTION: Apache HTTP Server could allow a remote attacker to redirect HTTP traffic of CGI application, caused by the lack of protection of untrusted client data in the HTTP_PROXY environment variable. PROBLEM CONCLUSION: The bundled expat library was updated with the latest fixes, and IHS was updated to not copy the particular request header into HTTP-prefixed environment variable to resolve httpoxy. The PI66849 APAR is expected to be included in IHS fixpacks: - 9.0.0.2 - 8.5.5.11 - 8.0.0.13 - 7.0.0.43 The PI63098 APAR is expected to be included in IHS fixpacks: - 9.0.0.1 - 8.5.5.10 - 8.0.0.13 - 7.0.0.43 The PI65855 APAR is expected to be included in IHS fixpacks: - 9.0.0.1 - 8.5.5.11 - 8.0.0.13 - 7.0.0.43 Directions to apply fix: Special Instructions: None NOTE: The user must: * Be at V1.4.3 or newer of the Installation Manager. Certain iFixes may require a newer version of the Installation Manager and the Installation Manager will inform you during the installation process if a newer version is required. * Be logged in with the same authority level when unpacking a fix, fix pack, or refresh pack. The IBM Knowledge Center can provide details, if needed, on the use of the Installation Manager to apply the interim fix: http://publib.boulder.ibm.com/infocenter/install/v1r4/index.jsp. 1) Shutdown IBM HTTP Server 2) Apply the interim fix using Installation Manager 3) Restart IBM HTTP Server Directions to remove fix: The IBM Knowledge Center can provide details, if needed, on the use of the Installation Manager to remove the interim fix: http://publib.boulder.ibm.com/infocenter/install/v1r4/index.jsp. 1) Shutdown IBM HTTP Server 2) Remove the interim fix using Installation Manager 3) Restart IBM HTTP Server Directions to re-apply fix: 1) Stop IBM HTTP Server. 2) Follow the directions to apply the fix. 3) Restart IBM HTTP Server. Additional Information: