5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
2.6 Low
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:H/Au:N/C:P/I:N/A:N
OpenSSL vulnerabilities were disclosed on May 3, 2016 by the OpenSSL Project. OpenSSL is used by IBM Rational ClearQuest. IBM Rational ClearQuest has addressed the applicable CVEs.
CVEID: CVE-2016-2107 DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive information caused by an error when the connection uses an AES CBC cipher and the server support AES-NI. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt traffic.
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/112854 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)
IBM Rational ClearQuest versions:
Version
|
Status
—|—
9.0 through 9.0.0.01
|
Affected
8.0.1 through 8.0.1.10
|
Affected
8.0 through 8.0.0.17
|
Affected
7.1.0.x, 7.1.1.x, 7.1.2.x (all versions)
|
Affected
Not all deployments of Rational ClearQuest use OpenSSL in a way that is affected by these vulnerabilities.
You are vulnerable if your use of Rational ClearQuest includes any of these configurations:
Apply a fix pack as listed in the table below. The fix pack includes OpenSSL 1.0.2h.
Affected Versions
|
** Applying the fix**
—|—
9.0 through 9.0.0.01
| Install Rational ClearQuest Fix Pack 2 (9.0.0.02) for 9.0
8.0.1 through 8.0.1.11
| Install Rational ClearQuest Fix Pack 12 (8.0.1.12) for 8.0.1
8.0 through 8.0.0.18
| Install Rational ClearQuest Fix Pack 18 (8.0.0.19) for 8.0
7.1.2.x (all fix packs)
7.1.1.x (all fix packs)
7.1.0.x (all fix packs)
| Customers on extended support contracts should contact Customer Support.
For 7.0.x, 7.1.x and earlier releases, IBM recommends upgrading to a fixed, supported version/release/platform of the product.
If exposure is due to hooks and scripts, disable the scripts that uses SSL and runs in ratlperl, cqperl or ClearQuest hooks until you apply the fixes listed above.
5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
2.6 Low
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:H/Au:N/C:P/I:N/A:N