<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
{mso-style-priority:99;
mso-style-link:"Plain Text Char";
margin:0in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
{mso-style-priority:34;
margin-top:0in;
margin-right:0in;
margin-bottom:0in;
margin-left:.5in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
p.msonormal0, li.msonormal0, div.msonormal0
{mso-style-name:msonormal;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman",serif;}
span.PlainTextChar
{mso-style-name:"Plain Text Char";
mso-style-priority:99;
mso-style-link:"Plain Text";
font-family:"Calibri",sans-serif;}
p.paragraph, li.paragraph, div.paragraph
{mso-style-name:paragraph;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman",serif;}
span.EmailStyle22
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:windowtext;}
span.EmailStyle23
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:windowtext;}
span.EmailStyle24
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:windowtext;}
span.normaltextrun
{mso-style-name:normaltextrun;}
span.eop
{mso-style-name:eop;}
span.EmailStyle28
{mso-style-type:personal-reply;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:70.85pt 56.7pt 56.7pt 56.7pt;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="#0563C1" vlink="#954F72">
<div class="WordSection1">
<p class="MsoNormal">HCL Software is pleased to announce the availability of BigFix Remote Control version 10.0 FP4<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">**Resolved Defect Articles:**<o:p></o:p></p>
<p class="MsoNormal">- KB0086512: Application Reset may cause a series of unnecessary LDAP Synchronizations.<o:p></o:p></p>
<p class="MsoNormal">- KB0087383: Controller Install / Upgrade task may fail.<o:p></o:p></p>
<p class="MsoNormal">- KB0086742: Remote Control upgrade installer cannot connect to the SQL database.<o:p></o:p></p>
<p class="MsoNormal">- KB0088685: Missing signature for Windows On Demand target executable.<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">**Security vulnerabilities addressed:**<o:p></o:p></p>
<p class="MsoNormal">Remote Control Server and Broker components are affected by the following vulnerability (See KB0090435 for more details):<o:p></o:p></p>
<p class="MsoNormal">-CVE ID: CVE-2020-14277<o:p></o:p></p>
<p class="MsoNormal">Description: Weak TLS-RSA key exchange algorithm is enabled in BigFix Remote Control
<o:p></o:p></p>
<p class="MsoNormal">CVSS v3 Score: 3.7<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Remote Control Server and Controller components are affected by the following Java vulnerabilities (See KB0090438 for more details):<o:p></o:p></p>
<p class="MsoNormal">-CVEID: CVE-2020-27221<o:p></o:p></p>
<p class="MsoNormal">DESCRIPTION: Eclipse OpenJ9 is vulnerable to a stack-based buffer overflow when the virtual machine or JNI natives are converting from UTF-8 characters to platform encoding. By sending an overly long string, a remote attacker could overflow
a buffer and execute arbitrary code on the system or cause the application to crash.<o:p></o:p></p>
<p class="MsoNormal">CVSS Base score: 9.8<o:p></o:p></p>
<p class="MsoNormal">Affected components: Server on Linux<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">-CVEID: CVE-2020-2773<o:p></o:p></p>
<p class="MsoNormal">DESCRIPTION: An unspecified vulnerability in Java SE related to the Java SE Security component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors.<o:p></o:p></p>
<p class="MsoNormal">CVSS Base score: 3.7<o:p></o:p></p>
<p class="MsoNormal">Affected components: Server/Controller on Linux/Windows<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">-CVEID: CVE-2020-14782<o:p></o:p></p>
<p class="MsoNormal">DESCRIPTION: An unspecified vulnerability in Java SE related to the Libraries component could allow an unauthenticated attacker to cause no confidentiality impact, low integrity impact, and no availability impact.<o:p></o:p></p>
<p class="MsoNormal">CVSS Base score: 3.7<o:p></o:p></p>
<p class="MsoNormal">Affected components: Server/Controller on Linux/Windows<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">-CVEID: CVE-2020-14797<o:p></o:p></p>
<p class="MsoNormal">DESCRIPTION: An unspecified vulnerability in Java SE related to the Libraries component could allow an unauthenticated attacker to cause no confidentiality impact, low integrity impact, and no availability impact.<o:p></o:p></p>
<p class="MsoNormal">CVSS Base score: 3.7<o:p></o:p></p>
<p class="MsoNormal">Affected components: Server/Controller on Linux/Windows<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">**Published site version:**<o:p></o:p></p>
<p class="MsoNormal">Remote Control, site version 70 (Build Number 10.0.0.0410)<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">With kind regards,<o:p></o:p></p>
<p class="MsoNormal"> The BigFix Remote Control Team <o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
</div>
</body>
</html>