CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
EPSS
Percentile
100.0%
IBM SECURITY ADVISORY
First Issued: Wed Jun 17 09:52:06 CDT 2015
|Updated: Tue Mar 1 10:07:14 CST 2016
|Update: Modified the impacted upper level fileset for 7.1.3
The most recent version of this document is available here:
http://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc
https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc
ftp://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc
Security Bulletin: Vulnerability in SSLv3 affects ftpd, sendmail, imapd,
and popd on AIX (CVE-2014-3566)
===============================================================================
SUMMARY:
SSLv3 contains a vulnerability that has been referred to as the Padding
Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled
in ftpd, sendmail when using the sendmail_ssl binary, imapd, and popd on
AIX.
===============================================================================
VULNERABILITY DETAILS:
CVEID: CVE-2014-3566
https://vulners.com/cve/CVE-2014-3566
DESCRIPTION:
Product could allow a remote attacker to obtain sensitive information,
caused by a design error when using the SSLv3 protocol. A remote user
with the ability to conduct a man-in-the-middle attack could exploit
this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy
Encryption) attack to decrypt SSL sessions and access the plaintext
of encrypted connections.
CVSS:
CVSS Base Score: 4.3
CVSS Temporal Score: See
http://xforce.iss.net/xforce/xfdb/97013 for the current score.
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)
AFFECTED PRODUCTS AND VERSIONS:
AIX 6.1, 7.1
VIOS 2.2.x
The following fileset levels are vulnerable:
AIX Fileset Lower Level Upper Level KEY
--------------------------------------------------------
bos.net.tcp.client 6.1.0.0 6.1.8.19 key_w_fs
bos.net.tcp.client 6.1.0.0 6.1.9.48 key_w_fs
bos.net.tcp.client 7.1.0.0 7.1.2.19 key_w_fs
| bos.net.tcp.client 7.1.0.0 7.1.3.45 key_w_fs
bos.net.tcp.server 6.1.0.0 6.1.8.18 key_w_fs
bos.net.tcp.server 6.1.0.0 6.1.9.45 key_w_fs
bos.net.tcp.server 7.1.0.0 7.1.2.18 key_w_fs
bos.net.tcp.server 7.1.0.0 7.1.3.45 key_w_fs
AIX Fileset (VIOS) Lower Level Upper Level
------------------------------------------------------------
bos.net.tcp.client 6.1.0.0(2.2.0.0) 6.1.8.19(2.2.2.6)
bos.net.tcp.client 6.1.0.0(2.2.0.0) 6.1.9.48(2.2.3.50)
bos.net.tcp.server 6.1.0.0(2.2.0.0) 6.1.8.18(2.2.2.6)
bos.net.tcp.server 6.1.0.0(2.2.0.0) 6.1.9.45(2.2.3.50)
Note: to find out whether the affected filesets are installed
on your systems, refer to the lslpp command found in AIX user's guide.
Example: lslpp -L | grep -i bos.net.tcp.client
REMEDIATION:
A. APARS
IBM has assigned the following APARs to this problem:
For ftpd:
AIX Level APAR Availability SP KEY PRODUCT(S)
------------------------------------------------------------
6.1.8 IV69768 9/30/15 SP7 key_w_apar ftpd
6.1.9 IV73324 12/04/15 SP6 key_w_apar ftpd
7.1.2 IV73319 9/30/15 SP7 key_w_apar ftpd
7.1.3 IV73316 2/26/16 SP6 key_w_apar ftpd
Subscribe to the APARs here:
http://www.ibm.com/support/docview.wss?uid=isg1IV69768
http://www.ibm.com/support/docview.wss?uid=isg1IV73324
http://www.ibm.com/support/docview.wss?uid=isg1IV73319
http://www.ibm.com/support/docview.wss?uid=isg1IV73316
For sendmail:
Please note that these only apply to the SSL-enabled
sendmail binary, /usr/sbin/sendmail_ssl. The default
sendmail binary, /usr/sbin/sendmail, does not use SSL and
is therefore not vulnerable to POODLE.
AIX Level APAR Availability SP KEY PRODUCT(S)
------------------------------------------------------------
6.1.8 IV73416 9/30/15 SP7 key_w_apar sendmail
6.1.9 IV73417 12/04/15 SP6 key_w_apar sendmail
7.1.2 IV73418 9/30/15 SP7 key_w_apar sendmail
7.1.3 IV73419 2/26/16 SP6 key_w_apar sendmail
Subscribe to the APARs here:
http://www.ibm.com/support/docview.wss?uid=isg1IV73416
http://www.ibm.com/support/docview.wss?uid=isg1IV73417
http://www.ibm.com/support/docview.wss?uid=isg1IV73418
http://www.ibm.com/support/docview.wss?uid=isg1IV73419
For imapd and popd:
AIX Level APAR Availability SP KEY PRODUCT(S)
------------------------------------------------------------
6.1.8 IV73973 9/30/15 SP7 key_w_apar imapd/popd
6.1.9 IV73976 12/04/15 SP6 key_w_apar imapd/popd
7.1.2 IV73974 9/30/15 SP7 key_w_apar imapd/popd
7.1.3 IV73975 2/26/16 SP6 key_w_apar imapd/popd
Subscribe to the APARs here:
http://www.ibm.com/support/docview.wss?uid=isg1IV73973
http://www.ibm.com/support/docview.wss?uid=isg1IV73976
http://www.ibm.com/support/docview.wss?uid=isg1IV73974
http://www.ibm.com/support/docview.wss?uid=isg1IV73975
By subscribing, you will receive periodic email alerting you
to the status of the APAR, and a link to download the fix once
it becomes available.
B. FIXES
Fixes are available. The fixes can be downloaded via ftp or
http from:
ftp://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar
http://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar
https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar
The link above is to a tar file containing this signed
advisory, fix packages, and OpenSSL signatures for each package.
The fixes below include prerequisite checking. This will
enforce the correct mapping between the fixes and AIX
Technology Levels.
For ftpd:
AIX Level Interim Fix (*.Z) KEY PRODUCT(S)
----------------------------------------------------------
6.1.8.6 IV69768s6a.150515.epkg.Z key_w_fix ftpd
6.1.9.5 IV73324s5a.150515.epkg.Z key_w_fix ftpd
7.1.2.6 IV73319s6a.150515.epkg.Z key_w_fix ftpd
7.1.3.5 IV73316s5a.150515.epkg.Z key_w_fix ftpd
VIOS Level Interim Fix (*.Z) KEY PRODUCT(S)
-----------------------------------------------------------
2.2.2.6 IV69768s6a.150515.epkg.Z key_w_fix ftpd
2.2.3.50 IV73324s5a.150515.epkg.Z key_w_fix ftpd
For sendmail:
Please note that these only apply to the SSL-enabled
sendmail binary, /usr/sbin/sendmail_ssl. The default
sendmail binary, /usr/sbin/sendmail, does not use SSL and
is therefore not vulnerable to POODLE.
AIX Level Interim Fix (*.Z) KEY PRODUCT(S)
----------------------------------------------------------
6.1.8.6 IV73416s6a.150520.epkg.Z key_w_fix sendmail
6.1.9.5 IV73417s5a.150520.epkg.Z key_w_fix sendmail
7.1.2.6 IV73418s6a.150520.epkg.Z key_w_fix sendmail
7.1.3.5 IV73419s5a.150520.epkg.Z key_w_fix sendmail
VIOS Level Interim Fix (*.Z) KEY PRODUCT(S)
-----------------------------------------------------------
2.2.2.6 IV73416s6a.150520.epkg.Z key_w_fix sendmail
2.2.3.50 IV73417s5a.150520.epkg.Z key_w_fix sendmail
For imapd and popd:
AIX Level Interim Fix (*.Z) KEY PRODUCT(S)
----------------------------------------------------------
6.1.8.6 IV73973s6a.150609.epkg.Z key_w_fix imapd/popd
6.1.9.5 IV73976s5a.150609.epkg.Z key_w_fix imapd/popd
7.1.2.6 IV73974s6b.150610.epkg.Z key_w_fix imapd/popd
7.1.3.5 IV73975s5a.150619.epkg.Z key_w_fix imapd/popd
VIOS Level Interim Fix (*.Z) KEY PRODUCT(S)
-----------------------------------------------------------
2.2.2.6 IV73973s6a.150609.epkg.Z key_w_fix imapd/popd
2.2.3.50 IV73976s5a.150609.epkg.Z key_w_fix imapd/popd
To extract the fixes from the tar file:
tar xvf nettcp_fix.tar
cd nettcp_fix
Verify you have retrieved the fixes intact:
The checksums below were generated using the
"openssl dgst -sha256 file" command as the followng:
For ftpd:
openssl dgst -sha256 filename KEY
-----------------------------------------------------------------------------------------------------
e7abdef186219eb2b039cc19746a1914725b2018d6ff9558bd43df3fa18514fa IV69768s6a.150515.epkg.Z key_w_csum
9f608ce43a1d828d3414f9c02fc41358d0e9ae4dcbac4d7f549d7cc9b5a7afb4 IV73324s5a.150515.epkg.Z key_w_csum
89a73255f06eb6bffeb5884bfce3b1a3b97b1e4d477affb7b92c4c8a9196de75 IV73319s6a.150515.epkg.Z key_w_csum
4ad25780e666538604e490494d7c5b6c48b9ed71c72d9f54cecd749480851c59 IV73316s5a.150515.epkg.Z key_w_csum
For sendmail:
openssl dgst -sha256 filename KEY
-----------------------------------------------------------------------------------------------------
7083ce308673424836224cadf6e021df35bf461b66a262c2691c043748242ee9 IV73416s6a.150520.epkg.Z key_w_csum
638e54c7f0218f020370e261d4d4a68b355568dbf5119384c4a82c7d4b374832 IV73417s5a.150520.epkg.Z key_w_csum
cd99a31c28acdc76d6a5c48b47c3c915cd7fd1c18b2cab1e356aed47fc7d2a97 IV73418s6a.150520.epkg.Z key_w_csum
21f0b58c4a5bebb91c7f531ec3f8a301ba45b991cf1bd27fd323926d28b269e9 IV73419s5a.150520.epkg.Z key_w_csum
For imapd and popd:
openssl dgst -sha256 filename KEY
-----------------------------------------------------------------------------------------------------
3e3e27c1b2b07b363423fba245047c6ddf2e94605d0d051e2d50b08bf74b2c23 IV73973s6a.150609.epkg.Z key_w_csum
a4225da8f1fa4173e2a483dd656bdc2b5ac0fd8c68f4a1434eac05daeb1bdca9 IV73976s5a.150609.epkg.Z key_w_csum
b2e11c499f66f09f3268626939b2037b3b6e949a2a80dc1f3551998a47d5815a IV73974s6b.150610.epkg.Z key_w_csum
b2160ee3496e57cae7d66c480bd8c2b965e37b43564731fd799a335c00a7d11b IV73975s5a.150619.epkg.Z key_w_csum
These sums should match exactly. The OpenSSL signatures in the tar
file and on this advisory can also be used to verify the
integrity of the fixes. If the sums or signatures cannot be
confirmed, contact IBM AIX Security at
[email protected] and describe the discrepancy.
openssl dgst -sha1 -verify <pubkey_file> -signature <advisory_file>.sig <advisory_file>
openssl dgst -sha1 -verify <pubkey_file> -signature <ifix_file>.sig <ifix_file>
Published advisory OpenSSL signature file location:
http://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc.sig
https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc.sig
ftp://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc.sig
C. FIX AND INTERIM FIX INSTALLATION
IMPORTANT: If possible, it is recommended that a mksysb backup
of the system be created. Verify it is both bootable and
readable before proceeding.
To preview a fix installation:
installp -a -d fix_name -p all # where fix_name is the name of the
# fix package being previewed.
To install a fix package:
installp -a -d fix_name -X all # where fix_name is the name of the
# fix package being installed.
Interim fixes have had limited functional and regression
testing but not the full regression testing that takes place
for Service Packs; however, IBM does fully support them.
Interim fix management documentation can be found at:
http://www14.software.ibm.com/webapp/set2/sas/f/aix.efixmgmt/home.html
To preview an interim fix installation:
emgr -e ipkg_name -p # where ipkg_name is the name of the
# interim fix package being previewed.
To install an interim fix package:
emgr -e ipkg_name -X # where ipkg_name is the name of the
# interim fix package being installed.
WORKAROUNDS AND MITIGATIONS:
None.
===============================================================================
CONTACT US:
If you would like to receive AIX Security Advisories via email,
please visit "My Notifications":
http://www.ibm.com/support/mynotifications
To view previously issued advisories, please visit:
http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq
Comments regarding the content of this announcement can be
directed to:
[email protected]
To obtain the OpenSSL public key that can be used to verify the
signed advisories and ifixes:
Download the key from our web page:
http://www.ibm.com/systems/resources/systems_p_os_aix_security_pubkey.txt
To obtain the PGP public key that can be used to communicate
securely with the AIX Security Team via [email protected] you
can either:
A. Download the key from our web page:
http://www.ibm.com/systems/resources/systems_p_os_aix_security_pgppubkey.txt
B. Download the key from a PGP Public Key Server. The key ID is:
0x28BFAA12
Please contact your local IBM AIX support center for any
assistance.
REFERENCES:
Complete CVSS Guide: http://www.first.org/cvss/cvss-guide.html
On-line Calculator V2:
http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2
ACKNOWLEDGEMENTS:
None.
CHANGE HISTORY:
First Issued: Wed Jun 17 09:52:06 CDT 2015
Updated: Thu Jun 18 09:48:23 CDT 2015
Update: Corrected vulnerable 7.1.2 upper fileset levels
Updated: Fri Jun 19 08:27:55 CDT 2015
Update: New iFix IV73975s5a filename and checksum. iFix rebuilt with a new,
corrected description on install but is functionally the same.
Updated: Fri Jun 26 15:52:00 CDT 2015
Update: Added clarification that the sendmail fixes only apply when
using the SSL-enabled sendmail binary, /usr/sbin/sendmail_ssl
Updated: Wed Nov 4 11:13:43 CST 2015
Update: Specified the VIOS fixes
| Updated: Tue Mar 1 10:07:14 CST 2016
| Update: Modified the impacted upper level fileset for 7.1.3
===============================================================================
*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.
Disclaimer
According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an “industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
EPSS
Percentile
100.0%