Lucene search

K
ibmIBM03180DAB39E0A4D2F6A125A173EDF5A9BB41D6EC602F0BC77B45013371762493
HistorySep 29, 2018 - 6:04 p.m.

Security Bulletin: Vulnerability in OpenSSL affects IBM Rational ClearQuest (CVE-2016-2107)

2018-09-2918:04:03
www.ibm.com
27

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

Summary

OpenSSL vulnerabilities were disclosed on May 3, 2016 by the OpenSSL Project. OpenSSL is used by IBM Rational ClearQuest. IBM Rational ClearQuest has addressed the applicable CVEs.

Vulnerability Details

CVEID: CVE-2016-2107 DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive information caused by an error when the connection uses an AES CBC cipher and the server support AES-NI. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt traffic.
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/112854 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)

Affected Products and Versions

IBM Rational ClearQuest versions:

Version

|

Status

—|—

9.0 through 9.0.0.01

|

Affected

8.0.1 through 8.0.1.10

|

Affected

8.0 through 8.0.0.17

|

Affected

7.1.0.x, 7.1.1.x, 7.1.2.x (all versions)

|

Affected

Not all deployments of Rational ClearQuest use OpenSSL in a way that is affected by these vulnerabilities.

You are vulnerable if your use of Rational ClearQuest includes any of these configurations:

  1. You use SSL connections in perl scripts run by ratlperl or cqperl, or by ClearQuest hooks. In this situation, you should review all the fixes provided by the OpenSSL project to see which ones apply to your use of OpenSSL. See the references link below.
  2. You integrate with ClearCase. See Security Bulletin: Vulnerability in OpenSSL affects IBM Rational ClearCase (CVE-2016-2107)
  3. You connect to a ClearQuest database using SSL.

Remediation/Fixes

Apply a fix pack as listed in the table below. The fix pack includes OpenSSL 1.0.2h.

Affected Versions

|

** Applying the fix**

—|—

9.0 through 9.0.0.01

| Install Rational ClearQuest Fix Pack 2 (9.0.0.02) for 9.0

8.0.1 through 8.0.1.11

| Install Rational ClearQuest Fix Pack 12 (8.0.1.12) for 8.0.1

8.0 through 8.0.0.18

| Install Rational ClearQuest Fix Pack 18 (8.0.0.19) for 8.0

7.1.2.x (all fix packs)
7.1.1.x (all fix packs)
7.1.0.x (all fix packs)

| Customers on extended support contracts should contact Customer Support.
For 7.0.x, 7.1.x and earlier releases, IBM recommends upgrading to a fixed, supported version/release/platform of the product.

Workarounds and Mitigations

If exposure is due to hooks and scripts, disable the scripts that uses SSL and runs in ratlperl, cqperl or ClearQuest hooks until you apply the fixes listed above.

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N