chunk_id string | chunk string |
|---|---|
03d822e3398ea5b6ab51d4bc1e5ed670_1 | Set skipsamebatch for VScan tasks 1. Run Rulerunner Manager.
2. On the Rulerunner tab, stop the service.
3. On the Rulerunner Login tab, click Connect.
4. On the Workflow tab, expand the hierarchy on the right and highlight VScan.
5. In the Settings section in the lower right, set skipsamebatch to 1.
6. Highlight the line labeled <dbs> above VScan in the thread hierarchy.
7. Set skipsamebatch to 1 there also.
8. Click Save, then go back to the Rulerunner tab and start the service.
For Datacap Taskmaster 8.0.1, the procedures are the same but some tabs will have different names.
If you are still experiencing this issue the problem may be with your DataCap Object (DCO). Correcting DCO issues will resolve batches left in running state. RELATED INFORMATION
VScan Intermittently Aborts [http://www.ibm.com/support/docview.wss?uid=swg21573034 ] |
52a60d014d5f01885520dc514767d22d_0 | IBM Security Bulletin: Multiple vulnerabilities have been identified in WebSphere Application Server shipped with WebSphere Service Registry and Repository (CVE-2015-4872 CVE-2015-4911 CVE-2015-4893 CVE-2015-4803) - United States SECURITY BULLETIN
SUMMARY
WebSphere Application Server is shipped as a component of WebSphere Service Registry and Repository. Information about security vulnerabilities affecting WebSphere Application Server have been published in a security bulletin.
VULNERABILITY DETAILS
Please consult the security bulletin WebSphere Application Server [http://www.ibm.com/support/docview.wss?uid=swg21969620] for vulnerability details and information about fixes.
In addition to to CVE-2015-4872 WebSphere Service Registry and Repository is vulnerable to the following issues.
CVEID: CVE-2015-4911 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911] |
52a60d014d5f01885520dc514767d22d_1 | DESCRIPTION: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service.
CVSS Base Score: 5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/107360 [https://exchange.xforce.ibmcloud.com/vulnerabilities/107360] for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVEID: CVE-2015-4893 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893]
DESCRIPTION: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service.
CVSS Base Score: 5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/107359 [https://exchange.xforce.ibmcloud.com/vulnerabilities/107359] for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVEID: CVE-2015-4803 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803] |
52a60d014d5f01885520dc514767d22d_2 | DESCRIPTION: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service.
CVSS Base Score: 5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/107358 [https://exchange.xforce.ibmcloud.com/vulnerabilities/107358] for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
AFFECTED PRODUCTS AND VERSIONS |
52a60d014d5f01885520dc514767d22d_3 | Principle Product and Version(s) Affected Supporting Product and Version WebSphere Service Registry and Repository V8.5 WebSphere Application Server Network Deployment V8.5.5 WebSphere Service Registry and Repository V8.0 WebSphere Application Server Network Deployment V8.0 WebSphere Service Registry and Repository V7.5 WebSphere Application Server Network Deployment V7.0 WebSphere Service Registry and Repository V7.0 WebSphere Application Server Network Deployment V7.0 GET NOTIFIED ABOUT FUTURE SECURITY BULLETINS
Subscribe to My Notifications [ http://www-01.ibm.com/software/support/einfo.html] to be notified of important product support alerts like this. |
52a60d014d5f01885520dc514767d22d_4 | IMPORTANT NOTE
IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site [http://www.ibm.com/systems/z/solutions/security_subintegrity.html]. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk. |
52a60d014d5f01885520dc514767d22d_5 | REFERENCES
Complete CVSS v2 Guide [http://www.first.org/cvss/v2/guide]
On-line Calculator v2 [http://nvd.nist.gov/CVSS-v2-Calculator]
Complete CVSS v3 Guide [http://www.first.org/cvss/user-guide]
On-line Calculator v3 [http://www.first.org/cvss/calculator/3.0] RELATED INFORMATION
IBM Secure Engineering Web Portal [http://www.ibm.com/security/secure-engineering/bulletins.html]
IBM Product Security Incident Response Blog [http://www.ibm.com/blogs/PSIRT] CHANGE HISTORY
02 February 2016: Original version published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. |
52a60d014d5f01885520dc514767d22d_6 | DISCLAIMER
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. |
ab26e1a0778fa5ba6b028ae80d49624a_0 | IBM Java Health Center Client - a low overhead monitoring tool - United States TECHNOTE (FAQ)
QUESTION
How can I monitor and diagnose my WebSphere Application Server environment without impacting performance?
ANSWER
Also see: Extracting data from Java Health Center [http://www.ibm.com/support/docview.wss?uid=swg21423006] |
ab26e1a0778fa5ba6b028ae80d49624a_1 | * Java™ Health Center:
Health Center is a very low overhead monitoring tool. It runs alongside an IBM Java application with a very small impact on the application's performance (less than 1%). Health Center monitors several application areas, using the information to provide recommendations and analysis that help you improve the performance and efficiency of your application. Health Center can save the data obtained from monitoring an application and load it again for analysis at a later date.
Starting with IBM Java 5 SR8 or IBM Java 6 SR1, The Health Center client can be installed within the IBM Support Assistant Team Server [http://www.ibm.com/software/support/isa/teamserver.html].
The Health Center client has several different views, each reporting data regarding a different aspect of the JVM. The views available are: |
ab26e1a0778fa5ba6b028ae80d49624a_2 | * Classes: Information about classes being loaded CPU: Processor usage for the application and the system on which it is running Environment: Details of the configuration and system of the monitored application Garbage Collection: Information about the Java heap and pause times I/O: Information about I/O activities that take place Locking: Information about contention on inflated locks Method Trace: Information about method use over time Native Memory: Information about the native memory usage Profiling: Provides a sampling profile of Java methods including call paths Threads: Information about the live threads of the monitored JVM WebSphere® Real Time for Linux: Information about real-time applications
To Install Health Center:
Health Center Client is installed as a plug-in for IBM Support Assistant (ISA), therefore, ISA must be installed prior to obtaining the Java Health Center.
* |
ab26e1a0778fa5ba6b028ae80d49624a_3 | * IBM How to Install and Update Problem Determination Tools for IBM Support Assistant Team Server
*
*
* Generic JVM Argument
*
*
*
*
(WebSphere) Java Version Generic JVM Argument Java 7.0 and later
Java 6.0 SR5 and later
Java 5.0 SR10 and later -Xhealthcenter Java 6.0 SR1 through SR4
Java 5.0 SR8 and SR9 -agentlib:healthcenter -Xtrace:output=perfmon.out |
ab26e1a0778fa5ba6b028ae80d49624a_4 | * *
* Connecting to an application by using the Health Center client
*
*
*
* BEST PRACTICE:
*
*
* Platform Requirements
*
*
*
* Note
*
* inside
*
*
* Start the Health Center client, open the help documentation, then navigate to IBM Support Assistant>Problem Determination Tools>IBM Monitoring and Diagnostic Tools - Health Center>Monitoring a running application>Installing Health Center and install the agent from there.
*
RELATED INFORMATION
IBM Monitoring and Diagnostic Tools for Java - Health C [http://www.ibm.com/developerworks/java/jdk/tools/healthcenter]
HC 01 Overview of Health Center features [http://www.youtube.com/watch?v=5Tcktcl0qxs]
IBM Monitoring and Diagnostic Tools for Java - Getting [http://www.ibm.com/developerworks/java/jdk/tools/healthcenter/getting_started.html]
IBM Support Assistant [http://www.ibm.com/software/support/isa/] |
0715d89b7a46b79bc94509b40045f46b_0 | IBM Security Bulletin: API Connect is affected by a Node.js denial of service vulnerability (CVE-2017-14919) - United States SECURITY BULLETIN
SUMMARY
IBM API Connect has addressed the following vulnerability.
Node.js is vulnerable to a denial of service, caused by an uncaught exception flaw in the zlib module. By making 8 an invalid value for the windowBits parameter, a remote attacker could exploit this vulnerability to cause the application to crash. |
0715d89b7a46b79bc94509b40045f46b_1 | VULNERABILITY DETAILS
CVEID:CVE-2017-14919 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14919]
DESCRIPTION:Node.js is vulnerable to a denial of service, caused by an uncaught exception flaw in the zlib module. By making 8 an invalid value for the windowBits parameter, a remote attacker could exploit this vulnerability to cause the application to crash.
CVSS Base Score: 7.5
CVSS Temporal Score: Seehttps://exchange.xforce.ibmcloud.com/vulnerabilities/134286 [https://exchange.xforce.ibmcloud.com/vulnerabilities/134286]for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
AFFECTED PRODUCTS AND VERSIONS
Affected API Connect Affected Versions IBM API Connect 5.0.0.0-5.0.6.4 IBM API Connect 5.0.7.0-5.0.7.2 IBM API Connect 5.0.8.0-5.0.8.1 REMEDIATION/FIXES
Affected Product Addressed in VRMF APAR Remediation/First Fix IBM API Connect
V5.0.0.0 - 5.0.6.4 5.0.6.5 LI79994 Addressed in IBM API Connect V5.0.6.5. |
0715d89b7a46b79bc94509b40045f46b_2 | Follow this link and find the "APIConnect-Portal" package.
https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm%7EWebSphere&product=ibm/WebSphere/IBM+API+Connect&release=5.0.6.4&platform=All&function=all [https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm%7EWebSphere&product=ibm/WebSphere/IBM+API+Connect&release=5.0.6.2&platform=All&function=all] IBM API Connect
V5.0.7.0 - 5.0.7.2 5.0.8.2 LI79994 Addressed in IBM API Connect V5.0.8.2.
Follow this link and find the "APIConnect_Management" and "APIConnect-Portal" packages.
https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm%7EWebSphere&product=ibm/WebSphere/IBM+API+Connect&release=5.0.8.1&platform=All&function=all [https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm%7EWebSphere&product=ibm/WebSphere/IBM+API+Connect&release=5.0.6.2&platform=All&function=all] IBM API Connect
V5.0.8.0 - 5.0.8.1 5.0.8.2 LI79994 Addressed in IBM API Connect V5.0.8.2. |
0715d89b7a46b79bc94509b40045f46b_3 | Follow this link and find the "APIConnect_Management" and "APIConnect-Portal" packages.
https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm%7EWebSphere&product=ibm/WebSphere/IBM+API+Connect&release=5.0.8.1&platform=All&function=all [https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm%7EWebSphere&product=ibm/WebSphere/IBM+API+Connect&release=5.0.6.2&platform=All&function=all] GET NOTIFIED ABOUT FUTURE SECURITY BULLETINS
Subscribe to My Notifications [ http://www-01.ibm.com/software/support/einfo.html] to be notified of important product support alerts like this.
REFERENCES
Complete CVSS v3 Guide [http://www.first.org/cvss/user-guide]
On-line Calculator v3 [http://www.first.org/cvss/calculator/3.0]
RELATED INFORMATION
IBM Secure Engineering Web Portal [http://www.ibm.com/security/secure-engineering/bulletins.html]
IBM Product Security Incident Response Blog [http://www.ibm.com/blogs/psirt] |
0715d89b7a46b79bc94509b40045f46b_4 | CHANGE HISTORY
08 February 2018: original document published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
DISCLAIMER
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. |
bde730cf18b0dd68331a805013afa9c3_0 | IBM Download IBM Tivoli Network Manager IP Edition Version 4.2.0.1 for AIX, Linux - United States DOWNLOADABLE FILES
ABSTRACT
This document describes how to download and install IBM Tivoli Network Manager IP Edition Version 4.2 Fix Pack 1 using the Passport Advantage Web site.
DOWNLOAD DESCRIPTION
IBM® Tivoli® Network Manager IP Edition discovers networks, including layer 1 optical networks, and layer 2 and 3 IP networks. Network Manager also discovers mobile networks (including LTE). In addition, Network Manager integrates network topology information with alert data from IBM Tivoli Netcool/OMNIbus so that operators can visualize and understand the layout of complex networks, and diagnose and solve network problems in real time. |
bde730cf18b0dd68331a805013afa9c3_1 | After logging into IBM's Passport Advantage Online Web site at https://www.ibm.com/software/howtobuy/passportadvantage/pao_customers.htm [http://www.ibm.com/software/howtobuy/passportadvantage/pao_customers.htm], click Software download & media access, then click Download finder, then select Find by product description and type in Tivoli Network Manager. Expand the Tivoli Software eAssembly, and select the images you wish to download from that list. All Tivoli Network Manager IP Edition download images are described below.
More information
The IBM Tivoli Network Manager IP Edition V4.2 library of publications are available from IBM Knowledge Center at https://www.ibm.com/support/knowledgecenter/SSSHRK_4.2.0/itnm/ip/wip/common/welcome.html [https://www.ibm.com/support/knowledgecenter/SSSHRK_4.2.0/itnm/ip/wip/common/welcome.html]
Downloading and installing the product |
bde730cf18b0dd68331a805013afa9c3_2 | 1. Download all of the parts that you need, both required and optional. The parts are listed in the sections below.
2. Unpack each of the parts into a single temporary directory on your system.
3. Follow the instructions in the Installing [https://www.ibm.com/support/knowledgecenter/SSSHRK_4.2.0/install/task/ins_installing.html] section of the IBM Knowledge Center to install the product.
Supported operating systems
On IBM® PowerPC-based systems, the following versions are supported:
* AIX® 6.1 iSeries and pSeries
* AIX 7.1 iSeries and pSeries
On Intel and Advanced Micro Devices (AMD) x86 processors, the following versions are supported:
* Red Hat Enterprise Linux 6 (x86-64)
* Red Hat Enterprise Linux 7 (x86-64)
* SuSE Linux Enterprise Server (SLES) 11.0 (x86-64) SP2 and SP3
Downloadable parts |
bde730cf18b0dd68331a805013afa9c3_3 | There are downloadable parts for each supported platform upon which IBM Tivoli Network Manager IP Edition can be installed. Refer to the tables below for details about what each part contains. At a minimum, you must download the required parts.
Required parts
To install IBM Tivoli Network Manager IP Edition V4.2.0.1 Multilingual, you need to download the following parts:
Part # Description CNE9VEN IBM Tivoli Network Manager IP Edition 4.2.0.1 for Linux Includes the base product including the core components, the GUI components, and the topology database scripts.
(English, Brazilian Portuguese, French, German, Italian, Spanish, Japanese, Korean, Hungarian, Polish, Russian, Simplified Chinese, and Traditional Chinese)
CNE9WEN IBM Tivoli Network Manager IP Edition 4.2.0.1 for AIX Includes the base product including the core components, the GUI components, and the topology database scripts. |
bde730cf18b0dd68331a805013afa9c3_4 | (English, Brazilian Portuguese, French, German, Italian, Spanish, Japanese, Korean, Hungarian, Polish, Russian, Simplified Chinese, and Traditional Chinese)
CNE9UML IBM Tivoli Network Manager IP Edition V4.2.0.1 Quick Start Guide.
DB2 is the default topology database in Network Manager 4.2. Network Manager 4.2 also supports Oracle Database version 12c Enterprise Edition with Partitioning option.
Part # Description CRYY2ML IBM DB2 10.5 Enterprise Server Edition for Tivoli Netcool/OMNIbus, Network Manager, and Netcool Configuration Manager
Optional parts
These optional parts are included in this eAssembly. |
bde730cf18b0dd68331a805013afa9c3_5 | Part # Description CRYY6ML IBM Tivoli Monitoring V6.3.0.2 and Monitoring Agent for Network Manager IP Edition V4.2 CN933EN IBM Tivoli Monitoring Agent for Network Manager V4.2 for Linux CN934EN IBM Tivoli Monitoring Agent for Network Manager V4.2 for AIX CN935EN IBM Tivoli Monitoring Agent for Network Manager V4.2 for Windows CJ0R8ML Jazz for Service Management v1.1.3 for Tivoli Netcool/OMNIbus, Network Manager, Netcool Configuration Manager, and Network Performance Insight CJ0S1ML Websphere Application Server 8.5.5.9 and SDK Java 7 for Tivoli Netcool/OMNIbus, Network Manager, and Netcool Configuration Manager
PREREQUISITES
For software and hardware prerequisites, see the Planning for installation section in the Network Manager 4.2 documentation on the IBM Knowledge Center. |
bde730cf18b0dd68331a805013afa9c3_6 | URL LANGUAGE SIZE(Bytes) Planning for installation [https://www.ibm.com/support/knowledgecenter/SSSHRK_4.2.0/install/task/pln_planninginst.html] English 1
INSTALLATION INSTRUCTIONS
To install the product, follow the instructions in the IBM Tivoli Network Manager IP Edition V4.2 Quick Start Guide. The Quick Start Guide is in multiple languages.
URL LANGUAGE SIZE(Bytes) Quick Start Guide [https://www-01.ibm.com/support/docview.wss?uid=swg27048605] English 1
DOWNLOAD PACKAGE
Download IBM Tivoli Network Manager IP Edition V4.2.0.1 from the Passport Advantage Online Web site.
Download RELEASE DATE LANGUAGE SIZE(Bytes) Download Options Download Network Manager 4.2.0.1 for AIX and Linux 22 Sep 2016 English 1 HTTPS [https://www-01.ibm.com/software/how-to-buy/passportadvantage/pao_customers.htm]
TECHNICAL SUPPORT |
bde730cf18b0dd68331a805013afa9c3_7 | You can access IBM Tivoli Product support at https://www.ibm.com/software/sysmgmt/products/support/IBMTivoliNetworkManagerIPEdition.html [https://www.ibm.com/software/sysmgmt/products/support/IBMTivoliNetworkManagerIPEdition.html]
You can access Passport Advantage Online support at https://www.ibm.com/software/howtobuy/passportadvantage/paocustomer/docs/en_US/ecare.html [https://www.ibm.com/software/howtobuy/passportadvantage/paocustomer/docs/en_US/ecare.html] |
e7bcb146bb310804a833e4bba1b9a54a_0 | IBM No data visible in Web Sites workspace for ITCAM for IIS (Q7) Agent - United States 5724C0FWATR; 5742C0FWA; 5724B97ISTR; 5724B97IS TECHNOTE (TROUBLESHOOTING)
PROBLEM(ABSTRACT)
After successfully installing and configuring the ITCAM agent for Microsoft IIS (q7), no data appears for IIS websites and no alerts occur when the web server is stopped. Similar issue may also occur for ITCAM agent for Microsoft .NET Framework (qf).
SYMPTOM
ITCAM agent for IIS agent
Agent shows no data for Web Sites running on the IIS Server in TEP.
ITCAM agent for .NET (qf)
Following symptoms may occur:
1) The Windows Application event log shows following event, and some data :
Faulting application name: kqfclient.exe, version: 0.0.0.0, time stamp: 0x52ce696f
Faulting module name: kqfclient.exe, version: 0.0.0.0, time stamp: 0x52ce696f
...
Faulting application path: C:\PROGRA~2\ibm\ITM\TMAITM~1\kqfclient.exe |
e7bcb146bb310804a833e4bba1b9a54a_1 | 2) No data is displayed in some workspaces, such as Web Sites view of Web Server workspace.
CAUSE
The required IIS role services and the IIS v6.0 Management Compatibility pack are not installed.
RESOLVING THE PROBLEM
To resolve this problem, install IIS 6.0 management compatibility pack on your Windows Server.
Note the following:
1) The symptom, cause and the remedial action mentioned in this technote applies to both .NET Framework agent and the ITCAM for IIS agent.
2) Even if you have IIS 7.0 - you should install the IIS 6.0 Management Compatibility Pack. This is not a part of IIS 6.0, but instead is a compatibility pack that is needed for higher IIS versions (IIS 7, 7.5, 8, 8.5). This option is found under the role services for IIS Web server.
Detailed instructions are as follows: |
e7bcb146bb310804a833e4bba1b9a54a_2 | (i) Ensure the following IIS Role Services are installed:
-------------------------------------------------------------------------------
IIS 6 Management Compatibility
IIS 6 Metabase Compatibility
IIS 6 WMI Compatibility
IIS 6 Scripting Tools
IIS 6 Management Console
[/support/docview.wss?uid=swg21685441&aid=1] [/support/docview.wss?uid=swg21685441&aid=1]
(ii) Ensure the IIS v6.0 Management Compatibility pack is installed:
---------------------------------------------------------------------------------------------------
1. On the Master or Replica host, open the Server Manager and select the Roles option.
Click the Add Roles button.
The first page of the Add Roles Wizard appears.
2. Click Next. The Select Server Roles window appears.
3. Select the Web Server (IIS) check box, and then click Next.
A pop-up message appears, asking you whether to add features required for Web Server (IIS).
4. Click Add Required Features.
The Select Server Roles window appears. |
e7bcb146bb310804a833e4bba1b9a54a_3 | 5. Click Next.
The Web Server (IIS) window appears.
6. Click Next.
The Select Role Service window appears.
7. On the Role Services list, select the IIS 6 Management Capability check box.
8. Click Next, and follow the Wizard instructions until the completion of the installation.
Restart the agent. |
43e88dd1ca801a2528cc3c7005c58d1b_0 | IBM NUM_IOSERVERS=AUTOMATIC behaviour is changed from 10.5FP7 - United States TECHNOTE (FAQ)
QUESTION
After updating to 10.5FP7 from an older fixpack level, I noticed that AUTOMATIC value for NUM_IOSERVERS is changed even though any settings are not changed. Is it expected bahavior?
ANSWER
Yes, it is expected. Due to IT09990, we changed the fomula for calculating the number of prefetchers to start at database activation time.
Until 10.5FP6, we use following fomula:
number of prefetchers =
max( max( max over all table spaces( parallelism setting ),
number of cores * number of SMT threads ), 16 )
Starting from 10.5FP7, we use following fomula:
number of prefetchers =
max( max( max over all table spaces( parallelism setting ),
number of cores * number of SMT threads ), 12 )
So you can see the following output in 10.5FP6 and FP7:
FP6:
$ db2 get db cfg | grep NUM_IOSERVERS
Number of I/O servers (NUM_IOSERVERS) = AUTOMATIC(16) |
43e88dd1ca801a2528cc3c7005c58d1b_1 | FP7
$ db2 get db cfg | grep NUM_IOSERVERS
Number of I/O servers (NUM_IOSERVERS) = AUTOMATIC(12)
RELATED INFORMATION
num_ioservers - Number of I/O servers configuration par [http://www.ibm.com/support/knowledgecenter/SSEPGG_10.5.0/com.ibm.db2.luw.admin.config.doc/doc/r0000333.html] |
0908bc44a0c8df18bec3cf4cfc93e4ca_0 | IBM FileNet Workplace XT NullPointerException when bootstrapping the object store or accessing Site Preferences/Access Role - United States java.lang.NullPointerException; workplacext bootstrap; user display name TECHNOTE (TROUBLESHOOTING)
PROBLEM(ABSTRACT)
After logging into FileNet Workplace XT, a java.lang.NullPointerException error is logged when bootstrapping the object store or when accessing Site Preferences/Access Role.
SYMPTOM
Error Stack Trace extracted from the J2EE Application Server error log:
java.lang.NullPointerException
at org.apache.jasper.runtime.JspWriterImpl.write(JspWriterImpl.java:421)
at com.filenet.wcm.apps.server.ui.info.prefs.PrefAccessRolesInfoPage.renderRoleMembers(PrefAccessRolesInfoPage.java:254)
at com.filenet.wcm.apps.server.ui.info.prefs.PrefAccessRolesInfoPage.renderRole(PrefAccessRolesInfoPage.java:220)
at com.filenet.wcm.apps.server.ui.info.prefs.PrefBootstrapInfoPage.renderAdminRole(PrefBootstrapInfoPage.java:131) |
0908bc44a0c8df18bec3cf4cfc93e4ca_1 | at com.filenet.wcm.apps.server.ui.info.prefs.PrefBootstrapInfoPage.render(PrefBootstrapInfoPage.java:303)
CAUSE
This behavior may occur if an invalid entry has been specified in the User Display Name Attribute or Group Display Name Attribute setting in the Directory Services Configuration in FileNet Enterprise Manager (FEM).
Workplace XT attempts to resolve the user names and groups defined within the Access Roles based on the Directory Service configuration defined in FEM. If the user name query resolves to null or if there is an invalid entry a NullPointerException error may occur.
RESOLVING THE PROBLEM
In FEM, change the User Display Name Attribute or Group Display Name Attribute to a valid LDAP entry such as cn, displayName or uid and restart the FileNet Content Engine and Workplace XT instances. |
181781158a53d829bfaab73421453efb_0 | IBM Replacement of an expiring certificate on the IBM WebSphere DataPower SOA Appliance - United States SSL HTTPS TECHNOTE (TROUBLESHOOTING)
PROBLEM(ABSTRACT)
What is the procedure for replacing an expiring certificate that is in use on the DataPower appliance with a newly obtained certificate?
CAUSE
Once you have obtained a new certificate from your certificate authority and are ready to replace the expiring one currently in use by your DataPower configuration with this new certificate, there is no single prescribed manner in which to perform the replacement operation. The following information presents some options for formulating an approach that best fits your environment. |
181781158a53d829bfaab73421453efb_1 | RESOLVING THE PROBLEM
First, know your certificate material. It's not uncommon for newer certificates to be chained, so it is not a one for one replacement; the existing certificate on the DataPower appliance may need to be replaced by more than one certificate. Therefore, it is important to ensure you have the full certificate chain, as appropriate (i.e, the personal, intermediate and root certificates). Certificate authorities may send two certificates in the chain and expect the third one to be downloaded from their website.
Here's a screenshot of a sample chain. Notice that you can check the 'Certification Path' tab if there are any remaining certificates in the chain. Also note the chain of "Issued To" and "Issued By" identities.
ExampleCertificateChain.jpg [/support/docview.wss?uid=swg21500046&aid=2]ExampleCertificateChain.jpg [/support/docview.wss?uid=swg21500046&aid=1] |
181781158a53d829bfaab73421453efb_2 | As for the certificate configuration on DataPower, the appliance will reference the actual key and certificate files stored in the cert: directory by file name. Navigation in the WebGUI to the SSL Proxy Profile -> Crypto Profile -> Crypto Key and Certificate objects will show the current files referenced by the configuration.
[/support/docview.wss?uid=swg21500046&aid=3] [/support/docview.wss?uid=swg21500046&aid=3]
For example, your DataPower configuration may currently reference the existing files cert:///current-key.pem and cert:///current-cert.pem.
[/support/docview.wss?uid=swg21500046&aid=4] [/support/docview.wss?uid=swg21500046&aid=4] |
181781158a53d829bfaab73421453efb_3 | As long as the replacement file(s) are NOT named the same as these files (i.e. the new ones are named cert:///new-key.pemand cert:///new-cert.pem for example), it is safe to load the new file(s) into the cert: directory at any time ahead of the replacement operation. Your existing configuration will not use the new files, so long as the Crypto Key and Certificate Objects still refer to the files associated with the expiring certificate (i.e. cert:///current-key.pem and cert:///current-cert.pem).
[/support/docview.wss?uid=swg21500046&aid=5] [/support/docview.wss?uid=swg21500046&aid=5] |
181781158a53d829bfaab73421453efb_4 | Having both expiring and replacement files in the cert: directory at once allows for the capability to modify the configuration to point to the new files or revert it back to the expiring files relatively easily or to configure a new SSL Proxy Profile object that references the new files. The new SSL Proxy Profile could be used to test independently of the currently running configuration using a new test service such as an XML Firewall.
You can navigate directly to the key and certificate objects using these paths:
Objects → Crypto Configuration → Crypto Certificate.
Objects → Crypto Configuration → Crypto Key
Another view is from Control Panel -> Keys and Certificate Management.
[/support/docview.wss?uid=swg21500046&aid=6] [/support/docview.wss?uid=swg21500046&aid=6]
Either way, note how the configuration ultimately references the files in the cert: directory and plan ahead for how you prefer to reference the new files. |
181781158a53d829bfaab73421453efb_5 | They may be swapped out within the existing Crypto Configuration objects (i.e. update the objects to reference the new file(s) or to revert to the expiring ones as needed).
Alternatively, a new separate set of Crypto Configuration objects that reference the new files may be created and replacement performed at the Crypto object level by updating the configuration to reference the new replacement Crypto Configuration objects.
Important Note: If the replacement certificate has the same file name of the expired certificate, you MUST disable/enable the certificate object in order to clear all cached references to the expired certificate.
For more information on certificates, refer to the product documentation specific to your firmware and appliance type. Navigate to the Administrator's Guide, under "Managing the Appliance" - "Working with keys and certificates" from the WebSphere DataPower Product Documentation Portal [http://www-01.ibm.com/support/docview.wss?uid=swg21377654]. |
7ecfd5c3a58ab4a9b6d5957db9e64c17_0 | IBM Portal 8 installation unable to detect the WebSphere Application Server - United States portal reinstall fails; install into existing WAS fails TECHNOTE (TROUBLESHOOTING)
PROBLEM
The IBM Installation Manager is unable to detect that a WebSphere Application Server exists when attempting to install Portal.
SYMPTOM
This issue seems to manifest when an existing Portal has been uninstalled and WebSphere Application Server is not uninstalled. When Portal install is attempted again, but this time to install into the existing WebSphere Application Server then Installation Manager will throw an excecption that notes that it is unable to detect WebSphere Application Server on the system
We have also seen an issue where the install fails indicating the version of WAS detected is insufficient and we see an exception like this in IIM logs: |
7ecfd5c3a58ab4a9b6d5957db9e64c17_1 | 49 INFO 00:03.14 This Cumulative Fix requires that IBM
WebSphere Portal Server version 8.0.0.0 be previously installed. You
must first install the base release and then update it with the
Cumulative Fix. You cannot install them at the same time.
50 ERROR 00:03.15 The required version 8.0.0.5 or later of
WebSphere Application Server has not been detected on this system.
Select the WebSphere Application Server Package to install WebSphere
Application Server and WebSphere Portal.
51 INFO 00:03.21 Stopping Installation Manager.
52 INFO 00:03.28 No log properties file found in:
/home/wasadmin/var/ibm/InstallationManager/logs
CAUSE
The issue is caused by Portal files that are not correctly removed from the AppServer folder structure when Portal is uninstalled.
ENVIRONMENT
Portal 8.0.0.x and WAS 8.0.0.x
RESOLVING THE PROBLEM
Navigate to the AppServer folder and remove the following files (they are regenerated with a reinstall of Portal): |
7ecfd5c3a58ab4a9b6d5957db9e64c17_2 | lib/ext/commons-codec-1.3.jar
lib/ext/commons-httpclient-3.0.1.jar
lib/ext/openid4java-full-0.9.5.jar
lib/ext/wp.auth.base.sua_RedirectServletFilter.jar
lib/ext/wp.auth.base.sua_loginmodule.jar
lib/ext/wp.auth.tai.jar
lib/wp.user.connections.jar
lib/wp.wire.jar
plugins/com.ibm.patch.was.plugin.jar
plugins/com.ibm.wp.was.plugin.jar
plugins/wp.ext.jar
properties/jndi.properties
Select the Recheck Status button. It should now say "All prerequisites are met." |
1d20feabc44997484fcdc301e975bc39_0 | IBM Wrong codepoints for non-ASCII characters inserted in UTF-8 database using CLP - United States CLP; insert; codepage; unicode; wrong codepoints; CharConversionException TECHNOTE (TROUBLESHOOTING)
PROBLEM(ABSTRACT)
During insert from the CLP there is no codepage conversion if operating system codepage and database codepage are both UTF-8. In this case data to be inserted should also be in UTF-8 encoding.
If data has a different encoding then the database codepage (this can be verified using any hex editor), then the operating system codepage should be changed to match the data's encoding in order to enforce the data conversion to the database codepage.
SYMPTOM
Error executing Select SQL statement. Caught by java.io.CharConversionException. ERRORCODE=-4220
Caused by:
java.nio.charset.MalformedInputException: Input length = 4759
at com.ibm.db2.jcc.b.u.a(u.java:19)
at com.ibm.db2.jcc.b.bc.a(bc.java:1762) |
1d20feabc44997484fcdc301e975bc39_1 | CAUSE
During an insert of data using CLP characters, they do not go through codepage conversion.
If operating system and database codepage both are UTF-8, but the data to be inserted is not Unicode, then data in the database might have incorrect codepoints (not-Unicode) and the above error will be a result during data retrieval.
To verify the encoding for data to be inserted you can use any editor that shows hex representation of characters. Please verify the codepoints for non-ASCII characters that you try to insert. If you see only 1 byte per non-ASCII characters then you need to force the database conversion during insert from CLP to UTF-8 database.
To force codepage conversion during insert from the CLP make sure that the operating system codepage is non-Unicode and matching to the codepage of data when you insert data to Unicode database from non-Unicode data source.
Problem Details
An example problem scenario is as follows: |
1d20feabc44997484fcdc301e975bc39_2 | 1. Create a database of type UTF-8:
CREATE DATABASE <db> USING CODESET utf-8 TERRITORY US
2. Create a table that holds character data:
CREATE TABLE test (col char(20))
3. Check operating system locale:
locale LANG=en_US.UTF-8
LC_CTYPE="en_US.UTF-8"
4. Insert the non-ASCII characters 'Ã' , '³', '©' which have codepoint 0x'C3', 0x'B3',0x'A9' in codepage 819 into the table:
INSERT INTO test VALUES ('Ã')
INSERT INTO test VALUES ('³')
INSERT INTO test VALUES ('©')
5. By running the following statement, you can see that all INSERT statements caused only one byte to be inserted into the table:
SELECT col, HEX(col) FROM test
à C3
³ B3
© A9
However, the UTF-8 representation of those characters are: 0x'C383' for 'Ã', 0x'C2B3' for '³', and 0x'C2A9' for '©'. |
1d20feabc44997484fcdc301e975bc39_3 | So these three rows in the table contain invalid characters in UTF-8.
6. When selecting from a column using the JDBC application, the following error will occur. This is expected because the table contains invalid UTF-8 data:
Error executing Select SQL statement. Caught by java.io.CharConversionException. ERRORCODE=-4220
Caused by:
java.nio.charset.MalformedInputException: Input length = 4759
at com.ibm.db2.jcc.b.u.a(u.java:19)
at com.ibm.db2.jcc.b.bc.a(bc.java:1762)
7. Delete all rows with incorrect Unicode codepoints from the test table:
DELETE * from test
8. Change the locale to one that matching codepage of data to be inserted: |
1d20feabc44997484fcdc301e975bc39_4 | export locale=en_us. One of the way to determine the codepage for your data can be found here: http://www.codeproject.com/Articles/17201/Detect-Encoding-for-In-and-Outgoing-Text [http://www.codeproject.com/Articles/17201/Detect-Encoding-for-In-and-Outgoing-Text]. If you prepare data yourself using some editor please check the documentation for your editor to find out how to set up the codepage for data being prepared by the editor.
9. Insert data to the table:
INSERT INTO test VALUES ('Ã')
INSERT INTO test VALUES ('³')
INSERT INTO test VALUES ('©')
10. Verify that inserted data were converted to UTF-8 during insert:
SELECT col, HEX(col) FROM test
à C383
³ C2B3
© C2A9
11. Run your java application selecting Unicode data. No exception should be reported. |
1d20feabc44997484fcdc301e975bc39_5 | ENVIRONMENT
UNIX, Linux, Unicode database
DIAGNOSING THE PROBLEM
Verify that non-ASCII data have a proper Unicode codepoints in Unicode database
RESOLVING THE PROBLEM
Reinsert data with codepage conversion enforced by setting the operation system codepage matching to the codepage of data to be inserted
RELATED INFORMATION
Export data: [http://www.ibm.com/developerworks/db2/library/techarticle/0210lau/0210lau.html] |
6e2cf0af52e03483c56647e73ec44ca9_0 | IBM Security Bulletin: IBM MQ and IBM MQ Appliance are vulnerable to SWEET32 Birthday attack (CVE-2016-2183) - United States SECURITY BULLETIN
SUMMARY
A security vulnerability affects IBM MQ and IBM MQ Appliance, that could allow an attacker to obtain sensitive information when using a channel CipherSpec that uses the Triple-DES algorithm. The affected CipherSpecs are:
- TRIPLE_DES_SHA_US
- FIPS_WITH_3DES_EDE_CBC_SHA
- ECDHE_ECDSA_3DES_EDE_CBC_SHA256
- ECDHE_RSA_3DES_EDE_CBC_SHA256 |
6e2cf0af52e03483c56647e73ec44ca9_1 | VULNERABILITY DETAILS
CVEID: CVE-2016-2183 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183]
DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive information, caused by an error in the DES/3DES cipher, used as a part of the SSL/TLS protocol. By capturing large amounts of encrypted traffic between the SSL/TLS server and the client, a remote attacker able to conduct a man-in-the-middle attack could exploit this vulnerability to recover the plaintext data and obtain sensitive information. This vulnerability is known as the SWEET32 Birthday attack.
CVSS Base Score: 3.7
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/116337 [https://exchange.xforce.ibmcloud.com/vulnerabilities/116337] for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
AFFECTED PRODUCTS AND VERSIONS
The following versions are affected: |
6e2cf0af52e03483c56647e73ec44ca9_2 | * IBM MQ * Maintenance levels between 8.0.0.0 and 8.0.0.5
* 9.0.0.0 only
* IBM MQ Appliance * Maintenance levels between 8.0.0.0 and 8.0.0.5
* IBM WebSphere MQ * Maintenance levels between 7.0.1.0 and 7.0.1.14
* Maintenance levels between 7.1.0.0 and 7.1.0.8
* Maintenance levels between 7.5.0.0 and 7.5.0.7
REMEDIATION/FIXES
IBM MQ V9.0
* Apply Fix Pack 9.0.0.1 [http://www-01.ibm.com/support/docview.wss?uid=swg27048059]
IBM MQ V8.0 & IBM MQ Appliance V8.0 * Apply Fix Pack 8.0.0.6 [https://www.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/WebSphere+MQ&release=8.0.0.6&platform=All&function=all].
* Apply Fix Pack 8.0.0.6 for IBM MQ Appliance [https://www.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/IBM+MQ+Appliance+M2000&release=8.0.0.6&platform=All&function=all]. |
6e2cf0af52e03483c56647e73ec44ca9_3 | IBM MQ V7.5.0 * Apply APAR IV90867 [http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EWebSphere&product=ibm/WebSphere/WebSphere+MQ&release=7.5.0.7&platform=All&function=aparId&apars=IV90867&source=fc].
IBM MQ V7.1.0 * Apply APAR IV90867 [http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EWebSphere&product=ibm/WebSphere/WebSphere+MQ&release=7.1.0.8&platform=All&function=aparId&apars=IV90867&source=fc].
IBM MQ V7.0.1 * Users of MQ 7.0.1 should contact IBM support to request an interim fix for APAR IV90867.
WORKAROUNDS AND MITIGATIONS
All versions of MQ can mitigate the vulnerability either by switching to an alternative CipherSpec or by enabling secret key reset.
Resetting SSL/TLS secret keys [http://www.ibm.com/support/knowledgecenter/SSFKSJ_9.0.0/com.ibm.mq.sec.doc/q014310_.htm] |
6e2cf0af52e03483c56647e73ec44ca9_4 | GET NOTIFIED ABOUT FUTURE SECURITY BULLETINS
Subscribe to My Notifications [ http://www-01.ibm.com/software/support/einfo.html] to be notified of important product support alerts like this.
IMPORTANT NOTE
IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site [http://www.ibm.com/systems/z/solutions/security_subintegrity.html]. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.
REFERENCES
Complete CVSS v3 Guide [http://www.first.org/cvss/user-guide]
On-line Calculator v3 [http://www.first.org/cvss/calculator/3.0] |
6e2cf0af52e03483c56647e73ec44ca9_5 | RELATED INFORMATION
IBM Secure Engineering Web Portal [http://www.ibm.com/security/secure-engineering/bulletins.html]
IBM Product Security Incident Response Blog [http://www.ibm.com/blogs/psirt]
CHANGE HISTORY
20 February 2017: Original version published
21 March 2017: Removed applicability to 9.0.1 release
4 April 2017: Added details for 7.0.1 fix
24 May 2017: Details for 9.0.0.1 added
19 June 2017: Removed HP & Solaris Specifics for 9.0.0.1
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. |
6e2cf0af52e03483c56647e73ec44ca9_6 | DISCLAIMER
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
RELATED INFORMATION
A Japanese translation is available [http://www.ibm.com/support/docview.wss?uid=swg21999690]
Cross reference information Segment Product Component Platform Version Edition Business Integration WebSphere MQ SSL Platform Independent 9.0, 8.0, 7.5, 7.1, 7.0.1 All Editions |
c83f54a555aeb1a88ed1afc9200ef888_0 | IBM Action required for IBM Integration Bus Hypervisor Edition V9.0 and WebSphere Message Broker Hypervisor Edition V8.0 for security vulnerabilities in Red Hat Linux - United States FLASH (ALERT)
ABSTRACT
IBM Integration Bus Hypervisor Edition V9.0 and WebSphere Message Broker Hypervisor Edition V8.0 require customer action for security vulnerabilities in Red Hat Linux. |
c83f54a555aeb1a88ed1afc9200ef888_1 | CONTENT
IBM Integration Bus Hypervisor Edition V9.0 and WebSphere Message Broker Hypervisor Edition V8.0 ship with versions of Red Hat Enterprise Linux (RHEL) Server that are vulnerable to CVE-2016-8677, CVE-2016-8678 CVE-2016-9298, CVE-2014-9915, CVE-2016-10046, CVE-2016-10047, CVE-2016-10048, CVE-2016-10049, CVE-2016-10050, CVE-2016-10051, CVE-2016-10052, CVE-2016-10053, CVE-2016-10054, CVE-2016-10055, CVE-2016-10056, CVE-2016-10057, CVE-2016-10058, CVE-2016-10059, CVE-2016-10060, CVE-2016-10061, CVE-2016-10062, CVE-2016-10063, CVE-2016-10064, CVE-2016-10065, CVE-2016-10066, CVE-2016-10067, CVE-2016-10068, CVE-2016-10069, CVE-2016-10070, CVE-2016-10071, CVE-2016-10144, CVE-2016-10145, CVE-2016-10146, CVE-2017-5506, CVE-2017-5507, CVE-2017-5508, CVE-2017-5511, CVE-2017-6498, CVE-2017-6499, CVE-2017-6500, CVE-2017-6501, CVE-2017-6502, CVE-2016-10252 and CVE-2017-6497 |
c83f54a555aeb1a88ed1afc9200ef888_2 | IBM Integration Bus Hypervisor Edition V9.0 and WebSphere Message Broker Hypervisor Edition V8.0 ship with Red Hat Enterprise Linux (RHEL) Server 6.2.
Remediation:
IBM strongly recommends that you contact Red Hat to obtain and install fixes for Red Hat Enterprise Linux (RHEL) Server 6.2, as applicable.
Cross reference information Segment Product Component Platform Version Edition Business Integration WebSphere Message Broker Hypervisor Edition Linux 8.0
PRODUCT ALIAS/SYNONYM
WMB HVE IIB HVE |
74d2d0fd4d4839a77349e688e3175a9d_0 | IBM The 'Manage Group' Add User search in the Process Admin Console does not return available users for IBM Business Process Manager (BPM) - United States TECHNOTE (TROUBLESHOOTING)
PROBLEM(ABSTRACT)
When you search for a user within the 'Manage Group' in the Process Admin Console for IBM Business Process Manager, a more specific search keyword does not result in any entries. In addition, an LDAP timeout message is added to the SystemOut.log file.
SYMPTOM
When you do a broad search with a small keyword, you expect to receive many entries in return. When your search is more specific, you use a longer keyword to try to narrow the search. However, when you expect fewer returns from your search, it does not happen. The user list remains empty.
You can find the following exception in the SystemOut.log file: |
74d2d0fd4d4839a77349e688e3175a9d_1 | [8/7/12 14:02:59:435 CEST] 000000xx exception E com.ibm.ws.wim.
adapter.ldap.LdapConnection search(String, String, Object[],
SearchControls) CWWIM4520E The 'javax.naming.NamingException: LDAP
response read timed out, timeout used:20000ms.; Remaining name:
'DC=xxx,DC=xxx,DC=xxx,DC=com'; Resolved object: 'com.sun.jndi.
ldap.LdapCtx@196fbd6a'' naming exception occurred during processing.
[8/7/12 14:02:59:435 CEST] 00000068 exception E com.ibm.ws.wim.
adapter.ldap.LdapConnection search(String, String, Object[],
SearchControls)
com.ibm.websphere.wim.exception.
WIMSystemException: CWWIM4520E The 'javax.naming.NamingException: LDAP
response read timed out, timeout used:20000ms.; Remaining name:
'DC=xxx,DC=xxx,DC=xxx,DC=com'; Resolved object: 'com.sun.jndi.
ldap.LdapCtx@196fbd6a'' naming exception occurred during processing.
at com.ibm.ws.wim.adapter.ldap.LdapConnection.search
(LdapConnection.java:2951)
at com.ibm.ws.wim.adapter.ldap.LdapConnection.checkSearchCache |
74d2d0fd4d4839a77349e688e3175a9d_2 | (LdapConnection.java:2781)
at com.ibm.ws.wim.adapter.ldap.LdapConnection.search
(LdapConnection.java:2971)
... |
74d2d0fd4d4839a77349e688e3175a9d_3 | CAUSE
In some cases, LDAP might take longer to respond on a more specific search, which results in an LDAP timeout.
RESOLVING THE PROBLEM
To resolve this issue, increase the LDAP timeout limit by using one of the following options: |
74d2d0fd4d4839a77349e688e3175a9d_4 | * Option 1
Use the wsadmin command:
$AdminTask updateIdMgrLDAPServer {-id AD -connectTimeout 0}
$AdminConfig save
After it is saved, view the wimconfig.xml file and make sure you see connectTimeout="0"
You can find the wimconfig.xml file in the following locations in the deployment manager configuration: * {WAS_HOME}\profiles\profile_name\config\cells\cell_name\wim\config\wimconfig.xml
* profile_root/conf/cells/cell_name/wim/config/wimconfig.xml
A complete restart of the WebSphere Application Server / IBM Business Process Manager environment is required to make this change take effect.
* Option 2
You will edit the wimconfig.xml file directly. However, before you edit the file, make a backup copy of it. Edit the wimconfig.xml file and search forconnectTimeout. Change this value from connectTimeout="20" to connectTimeout="0" and save the file. |
74d2d0fd4d4839a77349e688e3175a9d_5 | A complete restart of the WebSphere Application Server / IBM Business Process Manager environment is required to make this change take effect. |
74d2d0fd4d4839a77349e688e3175a9d_6 | Note: The connectTimeout increment value is in seconds of time. The example value 0 is to wait indefinitely. Different values can be set accordingly.
Cross reference information Segment Product Component Platform Version Edition Business Integration IBM Business Process Manager Standard Security AIX, Linux, Linux zSeries, Solaris, Windows 8.5, 8.0.1, 8.0, 7.5.1, 7.5 Business Integration IBM Business Process Manager Express Security Linux, Windows 8.5, 8.0.1, 8.0, 7.5.1, 7.5 |
8fd9d20eca84305cccb6d9fec118bdd6_0 | IBM ITCAM Data Collector connection to the Managing Server fails with Connection Refused. - United States TECHNOTE (TROUBLESHOOTING)
PROBLEM(ABSTRACT)
The Data Collector (DC) connection may fail with “Connection Refused” if the Managing Server’s(MS) host name can resolve to an IP address that cannot reach the MS.
CAUSE
The DC obtains the MS kernel’s network address from the MS. If a host name is specified for the kernel, and any of it’s resolved IP addresses cannot reach the MS from the DC, ITCAM’s connection attempt will fail if one of these "invalid” IP’s is used.
RESOLVING THE PROBLEM
Instead of host name, specify a “valid” IP address for the MS in the <MS_HOME>/bin/setenv.sh file, and in ITCAM 6.1, the ms.properties file. This solution usually works except when there is a firewall with Network Address Translation (NAT) enabled. In that case, you must make network changes so that all the resolved IPs can reach the MS.
Change as directed: |
8fd9d20eca84305cccb6d9fec118bdd6_1 | ITCAM 6.0 ( or earlier )
In MS_home/bin/setenv.sh:
KERNEL_HOST01=<ip addr of MS>
KERNEL_HOST02=<ip addr of MS>
ITCAM 6.1
In MS_home/bin/setenv.sh:
KERNEL_HOST01=<ip addr of MS>
am_socket_bindip=<ip addr of MS>
am_socket_exportip=<ip addr of MS>
In MS_HOME/etc/ms.properties, modify “kernel.hosts” specifying MS IP address:
kernel.hosts=<ip addr of MS>CBSPort:RFSPort:RMIPort - usually -
kernel.hosts=<ip addr of MS>9122:9120:9118
Example:
kernel.hosts=9.12.20.220:9122:9120:9118
Example of the error message:
This example is from z/OS, but the problem can occur on any platform.
<PPECONTROLLER, 60014b53-f7e9-db01-4272-2a9f50388c89.511,
9.12.20.161> Unable to join Kernel WSRT7.pdl.pok.ibm.com:9120 -
java.net.ConnectException: EDC8128I Connection refused.
(errno2=0x76630291); nested exception is:
java.net.ConnectException: EDC8128I Connection refused.
(errno2=0x76630291)
To determine IP addresses for a given MS host name [issue on the DC]:
nslookup <MS_host_name> |
8fd9d20eca84305cccb6d9fec118bdd6_2 | To test basic connectivity, for each IP address listed by NSLOOKUP, issue:
ping <ip_address> |
003aeb5260979086620fa1aa24170c91_0 | IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect WebSphere Message Broker and IBM Integration Bus - United States WMB IIB SECURITY BULLETIN
SUMMARY
Multiple security vulnerabilities exist in the IBM® Runtime Environment Java™ Technology Edition Version 6 Service Refresh 16 Fix Pack 41 and earlier releases used by WebSphere Message Broker, and the IBM® Runtime Environment Java™ Technology Edition Version 7 Service Refresh 10 Fix Pack 1 and earlier releases used by WebSphere Message Broker and IBM Integration Bus, and the IBM® Runtime Environment Java™ Technology Edition Version 7R1 Service Refresh 4 Fix Pack 1 and earlier releases used by IBM Integration Bus. These issues were disclosed as part of the IBM Java SDK updates in April 2017. WebSphere Message Broker and IBM Integration Bus have addressed the applicable CVEs |
003aeb5260979086620fa1aa24170c91_1 | VULNERABILITY DETAILS
If you run your own Java code using the IBM Java Runtime delivered with this product, you should evaluate your code to determine whether the complete list of vulnerabilities are applicable to your code. For a complete list of vulnerabilities, refer to the “IBM Java SDK Security Bulletin”, located in the References section for more information.
CVEID: CVE-2017-3511 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511]
DESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java SE, Java SE Embedded, JRockit JCE component could allow an unauthenticated attacker to take control of the system.
CVSS Base Score: 7.7
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/124890 [https://exchange.xforce.ibmcloud.com/vulnerabilities/124890] for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H) |
003aeb5260979086620fa1aa24170c91_2 | CVEID: CVE-2017-1289 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1289]
DESCRIPTION: IBM SDK, Java Technology Edition is vulnerable XML External Entity Injection (XXE) error when processing XML data. A remote attacker could exploit this vulnerability to expose highly sensitive information or consume memory resources.
CVSS Base Score: 8.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/125150 [https://exchange.xforce.ibmcloud.com/vulnerabilities/125150] for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L) |
003aeb5260979086620fa1aa24170c91_3 | CVEID: CVE-2016-9840 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9840]
DESCRIPTION: zlib is vulnerable to a denial of service, caused by an out-of-bounds pointer arithmetic in inftrees.c. By persuading a victim to open a specially crafted document, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base Score: 3.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/120508 [https://exchange.xforce.ibmcloud.com/vulnerabilities/120508] for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) |
003aeb5260979086620fa1aa24170c91_4 | CVEID: CVE-2016-9841 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9841]
DESCRIPTION: zlib is vulnerable to a denial of service, caused by an out-of-bounds pointer arithmetic in inftrees.c. By persuading a victim to open a specially crafted document, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base Score: 3.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/120509 [https://exchange.xforce.ibmcloud.com/vulnerabilities/120509] for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) |
003aeb5260979086620fa1aa24170c91_5 | CVEID: CVE-2016-9842 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9842]
DESCRIPTION: zlib is vulnerable to a denial of service, caused by an undefined left shift of negative number. By persuading a victim to open a specially crafted document, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base Score: 3.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/120510 [https://exchange.xforce.ibmcloud.com/vulnerabilities/120510] for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) |
003aeb5260979086620fa1aa24170c91_6 | CVEID: CVE-2016-9843 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9843]
DESCRIPTION: zlib is vulnerable to a denial of service, caused by a big-endian out-of-bounds pointer. By persuading a victim to open a specially crafted document, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base Score: 3.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/120511 [https://exchange.xforce.ibmcloud.com/vulnerabilities/120511] for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)
AFFECTED PRODUCTS AND VERSIONS
IBM Integration Bus V10.0.0.0- 10.0.0.8
IBM Integration Bus V9.0.0.0- 9.0.0.7
WebSphere Message Broker V8.0.0.0 - 8.0.0.8
REMEDIATION/FIXES |
003aeb5260979086620fa1aa24170c91_7 | Product VRMF APAR Remediation/Fix IBM Integration Bus V10.0.0.0- 10.0.0.8 IT20410 The APAR is available in fix pack 10.0.0.9 (on all platforms except HP) http://www-01.ibm.com/support/docview.wss?uid=swg24043686 [http://www-01.ibm.com/support/docview.wss?uid=swg24043686]
IBM Integration Bus V9.0.0.0- 9.0.0.7 IT20410 The APAR is available in fix pack 9.0.0.8 (on all platforms except HP) http://www-01.ibm.com/support/docview.wss?uid=swg24043751 [http://www-01.ibm.com/support/docview.wss?uid=swg24043751]
WebSphere Message Broker V8.0.0.0 - 8.0.0.8 IT20410 The APAR is available in fix pack 8.0.0.9 (on all platforms except HP) https://www.ibm.com/support/docview.wss?uid=swg24043806 [https://www.ibm.com/support/docview.wss?uid=swg24043806] |
003aeb5260979086620fa1aa24170c91_8 | For unsupported versions of the product IBM recommends upgrading to a fixed, supported version/release/platform of the product.
The planned maintenance release dates for WebSphere Message Broker and IBM Integration Bus are available at :
http://www.ibm.com/support/docview.wss?uid=swg27006308 [http://www.ibm.com/support/docview.wss?uid=swg27006308]
GET NOTIFIED ABOUT FUTURE SECURITY BULLETINS
Subscribe to My Notifications [ http://www-01.ibm.com/software/support/einfo.html] to be notified of important product support alerts like this. |
003aeb5260979086620fa1aa24170c91_9 | IMPORTANT NOTE
IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site [http://www.ibm.com/systems/z/solutions/security_subintegrity.html]. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.
REFERENCES
Complete CVSS v3 Guide [http://www.first.org/cvss/user-guide]
On-line Calculator v3 [http://www.first.org/cvss/calculator/3.0]
IBM Java SDK Security Bulletin [http://www.ibm.com/support/docview.wss?uid=swg22002169]
RELATED INFORMATION
IBM Secure Engineering Web Portal [http://www.ibm.com/security/secure-engineering/bulletins.html]
IBM Product Security Incident Response Blog [http://www.ibm.com/blogs/psirt] |
003aeb5260979086620fa1aa24170c91_10 | CHANGE HISTORY
30 Jun 2017 - Original version Published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
DISCLAIMER
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
RELATED INFORMATION
# |
003aeb5260979086620fa1aa24170c91_11 | Cross reference information Segment Product Component Platform Version Edition Business Integration WebSphere Message Broker 8.0
PRODUCT ALIAS/SYNONYM
WMB IIB |
9125d655b4d1fca88b7c9dfb743f67e1_0 | IBM Security Bulletin: Security Vulnerability in IBM WebSphere Application Server affects IBM SOA Policy Gateway Pattern for AIX Server 2.5 (CVE-2015-1920) - United States SECURITY BULLETIN
SUMMARY
A vulnerability in WebSphere Application Server could allow a remote attacker to execute arbitrary code by connecting to a management port and executing a specific sequence of instructions.
VULNERABILITY DETAILS
CVEID: CVE-2015-1920 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1920]
DESCRIPTION: WebSphere Application Server could allow a remote attacker to execute arbitrary code by connecting to a management port and executing a specific sequence of instructions.
CVSS Base Score: 9.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/102404 [https://exchange.xforce.ibmcloud.com/vulnerabilities/102404] for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C) |
9125d655b4d1fca88b7c9dfb743f67e1_1 | AFFECTED PRODUCTS AND VERSIONS
IBM SOA Policy Gateway Pattern for AIX Server version 2.5
REMEDIATION/FIXES
Customers should install WebSphere Application Server Interim Fix PI38302 [http://www-01.ibm.com/support/docview.wss?uid=swg24039898]
WORKAROUNDS AND MITIGATIONS
None
GET NOTIFIED ABOUT FUTURE SECURITY BULLETINS
Subscribe to My Notifications [ http://www-01.ibm.com/software/support/einfo.html] to be notified of important product support alerts like this.
REFERENCES
Complete CVSS v2 Guide [http://www.first.org/cvss/v2/guide]
On-line Calculator v2 [http://nvd.nist.gov/CVSS-v2-Calculator]
RELATED INFORMATION
IBM Secure Engineering Web Portal [http://www.ibm.com/security/secure-engineering/bulletins.html]
IBM Product Security Incident Response Blog [http://www.ibm.com/blogs/psirt]
ACKNOWLEDGEMENT
None
CHANGE HISTORY
8 June 2015: Original document published. |
9125d655b4d1fca88b7c9dfb743f67e1_2 | *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
DISCLAIMER
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. |
1320b4bb558fe78fa5e2773b0107a265_0 | IBM Security Bulletin: IBM Integration Bus is affected by Web UI security vulnerability (CVE-2017-1694) - United States SECURITY BULLETIN
SUMMARY
IBM Integration Bus has addressed the following vulnerability
VULNERABILITY DETAILS
CVEID: CVE-2017-1694 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1694]
DESCRIPTION: IBM Integration Bus transmits user credentials in plain in clear text which can be read by an attacker using man in the middle techniques.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/134165 [https://exchange.xforce.ibmcloud.com/vulnerabilities/134165] for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
AFFECTED PRODUCTS AND VERSIONS
IBM Integration Bus V10.0.0.0 - V10.0.0.9
IBM Integration Bus V9.0.0.0 - V9.0.0.9
REMEDIATION/FIXES |
1320b4bb558fe78fa5e2773b0107a265_1 | Product VRMF APAR Remediation / Fix IBM Integration Bus V10.0.0.0 to V10.0.0.9 APAR IT21391 The APAR is available in fix pack 10.0.0.10
http://www-01.ibm.com/support/docview.wss?uid=swg24043943 [http://www-01.ibm.com/support/docview.wss?uid=swg24043943] IBM Integration Bus V9.0.0.0 to V9.0.0.9 APAR IT21391 The APAR is available in fix pack 9.0.0.10
http://www-01.ibm.com/support/docview.wss?uid=swg24044363 [http://www-01.ibm.com/support/docview.wss?uid=swg24044363] WORKAROUNDS AND MITIGATIONS
None
GET NOTIFIED ABOUT FUTURE SECURITY BULLETINS
Subscribe to My Notifications [ http://www-01.ibm.com/software/support/einfo.html] to be notified of important product support alerts like this. |
1320b4bb558fe78fa5e2773b0107a265_2 | IMPORTANT NOTE
IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site [http://www.ibm.com/systems/z/solutions/security_subintegrity.html]. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.
REFERENCES
Complete CVSS v3 Guide [http://www.first.org/cvss/user-guide]
On-line Calculator v3 [http://www.first.org/cvss/calculator/3.0]
RELATED INFORMATION
IBM Secure Engineering Web Portal [http://www.ibm.com/security/secure-engineering/bulletins.html]
IBM Product Security Incident Response Blog [http://www.ibm.com/blogs/psirt]
CHANGE HISTORY
15th Dec 2017: Original version published |
1320b4bb558fe78fa5e2773b0107a265_3 | *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
DISCLAIMER
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
RELATED INFORMATION
# |
96ae12c0e1fbcb20d5b6312f1b494bf9_0 | IBM Security Bulletin: Vulnerability identified in OpenSSL shipped with IBM API Connect (CVE-2016-8610) - United States SECURITY BULLETIN
SUMMARY
An SSL vulnerability was disclosed by the OpenSSL Project. IBM API Connect has addressed the applicable CVE.
VULNERABILITY DETAILS
CVEID:CVE-2016-8610 [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610]
DESCRIPTION:SSL/TLS protocol is vulnerable to a denial of service, caused by an error when processing ALERT packets during a SSL handshake. By sending specially-crafted packets, a remote attacker could exploit this vulnerability to cause the application to stop responding.
CVSS Base Score: 7.5
CVSS Temporal Score: Seehttps://exchange.xforce.ibmcloud.com/vulnerabilities/118296 [https://exchange.xforce.ibmcloud.com/vulnerabilities/118296]for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
AFFECTED PRODUCTS AND VERSIONS
IBM API Connect V5.0.0.0 - V5.0.6.1 |
96ae12c0e1fbcb20d5b6312f1b494bf9_1 | REMEDIATION/FIXES
Product VRMF APAR Remediation/First Fix IBM API Connect 5.0.0.0 - 5.0.6.1 LI79599 Apply IBM API Connect V5.0.6.2 or later [https://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm~WebSphere&product=ibm/WebSphere/IBM+API+Connect&release=5.0.6.2&platform=All&function=all]
WORKAROUNDS AND MITIGATIONS
None
GET NOTIFIED ABOUT FUTURE SECURITY BULLETINS
Subscribe to My Notifications [ http://www-01.ibm.com/software/support/einfo.html] to be notified of important product support alerts like this.
REFERENCES
Complete CVSS v3 Guide [http://www.first.org/cvss/user-guide]
On-line Calculator v3 [http://www.first.org/cvss/calculator/3.0]
RELATED INFORMATION
IBM Secure Engineering Web Portal [http://www.ibm.com/security/secure-engineering/bulletins.html]
IBM Product Security Incident Response Blog [http://www.ibm.com/blogs/psirt]
CHANGE HISTORY
04 May 2017: Original version published |
96ae12c0e1fbcb20d5b6312f1b494bf9_2 | *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
DISCLAIMER
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. |
d308236252ddb3f50abca5baf4022562_0 | IBM Configuring floating license for Rational Integration Tester results in a warning 'The server is available, but does not serve license keys for IBM Rational Integration Tester' - United States Rational Integration Tester; License error; Users of ibmrit; PACKAGE ibmrtw ibmratl COMPONENTS="ibmrit ibmrft ibmrpt ibmrpt_pvu; The server is available; but does not serve license keys for IBM Rational Integration Tester TECHNOTE (TROUBLESHOOTING)
PROBLEM(ABSTRACT)
Attempts to configure the floating license for IBM Rational Integration Tester using IBM Installation Manager leads to the warning 'The server is available, but does not serve license keys for IBM Rational Integration Tester'.
SYMPTOM
Steps to reproduce: |
d308236252ddb3f50abca5baf4022562_1 | 1. In Rational Integration Tester client, Click on Start > IBM Installation Manager > Manage Licenses.
2. Highlight Rational Integration Tester from the List of Installed Products.
3. Configure floating license support [http://www-01.ibm.com/support/docview.wss?uid=swg21403623] for Rational Integration Tester.
4. Clicking on "Test Connection" results in the below message:
-------------------
'The server is available, but does not serve license keys for IBM Rational Integration Tester'.
-------------------
CAUSE
The PACKAGE ibmrtw block (as shown below) is missing which displays the components of IBM Rational Test Workbench Suite.
-------------------
PACKAGE ibmrtw ibmratl COMPONENTS="ibmrit ibmrft ibmrpt ibmrpt_pvu"
-------------------
DIAGNOSING THE PROBLEM
On the license server, launch Rational License Key Administrator. |
d308236252ddb3f50abca5baf4022562_2 | 1. Verify if there are 5 lines of 'IBM Rational Test Workbench License' key served by the license server as shown below:
[/support/docview.wss?uid=swg21608473&aid=1] [/support/docview.wss?uid=swg21608473&aid=1]
2. If the lines are not displayed, perform a status enquiry by clicking on Start> IBM Rational> LMTools > Server Status.
3. If the line 'Users of ibmrit' is missing, follow the steps below to resolve the problem.
RESOLVING THE PROBLEM
Steps to resolve: |
d308236252ddb3f50abca5baf4022562_3 | 1. Navigate to IBM Rational License Key Center [http://www-01.ibm.com/software/rational/support/licensing/] website.
2. Return and generate the license [https://www-304.ibm.com/support/docview.wss?uid=swg21308308] file for IBM Rational Test Workbench Floating License.
3. Download and Import the license file again.
4. Click on Start > IBM Rational > LMTools > Start/Stop/Reread tab to stop and start the license server.
5. Next, click on Start > IBM Rational > LMTools > Server Status to perform status enquiry and look for 'Users of ibmrit' line.
6. Reactivate [http://www-01.ibm.com/support/docview.wss?uid=swg21403623] the floating license for Rational Integration Tester using Rational Installation Manager. |
d308236252ddb3f50abca5baf4022562_4 | RELATED INFORMATION
#License Requirements for Rational Integration Tester [http://www-01.ibm.com/support/docview.wss?uid=swg21605379]
A simplified Chinese translation is available [http://www.ibm.com/support/docview.wss?uid=swg21674212] |
2e87792ad492de952af7260a8d98f036_0 | IBM JAZZ 1.1.0.3 for WebGUI (Pre-Req) not installing. - United States TIPL2INST; DASHL2INST; CRIMA1217E; prereq_checker.bat; prereq_checker.bat TECHNOTE (TROUBLESHOOTING)
PROBLEM(ABSTRACT)
Installation of Dashboard Application Service Hub (DASH) and Jazz for Service Management (JazzSM) components is failing even though the installation prerequisite scan apparently passed.
CAUSE
Upon further investigation, it was discovered the customer had only used the product code for DASH during prerequisite scan.
DIAGNOSING THE PROBLEM
During installation the following error is seen in the GUI installation window and logs:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
* |
2e87792ad492de952af7260a8d98f036_1 | The above error typically means there is not enough room on the system for software to deploy and the installation to complete successfully.
RESOLVING THE PROBLEM
In order to accurately determine if the installation prerequisites have been met, the user must pass both product codes to the prerequisite scanner. In this case, the user must pass the codes for DASH and Jazz simultaneously to the prerequisite scanner script.
The following table contains the product codes for the various integration services:
[/support/docview.wss?uid=swg21696179&aid=1] [/support/docview.wss?uid=swg21696179&aid=1]
In this particular case, in order to properly run the prerequisite scanner, the codes for DASH and JazzSM should be passed like this:
*
*
*
The above will provide a detailed listing of the prerequisites for both products along with which items have passed and which items have failed and need to be addressed before the installation will succeed. |
fedfa4b049be609e2ce6ef308310ba60_0 | IBM ITCAM Agent for WebSphere Applications V7.2 fixes - United States FIX README
ABSTRACT
IBM Tivoli Composite Application Manager Agent for WebSphere Applications V7.2 fixes
CONTENT
Installation Instructions
Refer to the README file located in Fix Central for additional information |
fedfa4b049be609e2ce6ef308310ba60_1 | Download |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.