5.4 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:N/I:P/A:C
GSKit is an IBM component that is used by IBM Rational ClearCase. The GSKit that is shipped with IBM Rational ClearCase contains multiple security vulnerabilities including the “FREAK: Factoring Attack on RSA-EXPORT keys" TLS/SSL client and server vulnerability. IBM Rational ClearCase has addressed the applicable CVEs.
CVEID: CVE-2015-0138 DESCRIPTION: A vulnerability in various IBM SSL/TLS implementations could allow a remote attacker to downgrade the security of certain SSL/TLS connections. An IBM SSL/TLS client implementation could accept the use of an RSA temporary key in a non-export RSA key exchange ciphersuite. This could allow a remote attacker using man-in-the-middle techniques to facilitate brute-force decryption of TLS/SSL traffic between vulnerable clients and servers.
This vulnerability is also known as the FREAK attack.
CVSS Base Score: 4.3
CVSS Temporal Score: See http://exchange.xforce.ibmcloud.com/#/vulnerabilities/100691 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Rational ClearCase 7.1.2.9 through 7.1.2.17, 8.0.0.4 through 8.0.0.14, and 8.0.1 through 8.0.1.7.
The IBM GSKit is used if ClearCase on Windows platforms is configured to integrate with IBM Rational ClearQuest, Rational Team Concert, or Jira with communication over SSL (https). This applies to any integration using Change Management Interface (CMI), and to non-CMI based UCM-enabled CQ integration via OSLC. If your ClearCase deployment is not using these integrations, or not using SSL with the integrations, then your deployment is not sensitive to this attack. The UCM-enabled CQ integration without using OSLC (SQUID) is not sensitive to this attack.
CMI and OSLC integrations
ClearCase Windows Client Version
|
Status
—|—
8.0.1 through 8.0.1.7
|
Affected if you use CMI or OSLC integrations
8.0.0.4 through 8.0.0.14
|
Affected if you use CMI or OSLC integrations
8.0 through 8.0.0.3
|
Not affected
7.1.2.9 through 7.1.2.16
|
Affected if you use CMI or OSLC integrations
7.1.2 through 7.1.2.8
|
Not affected
7.0.x, 7.1.0.x, 7.1.1.x
|
Not affected
**Note:**other components of ClearCase are subject to the “FREAK” attack, as disclosed in the following security bulletins:
Security Bulletin: A security vulnerability has been identified in IBM WebSphere Application Server shipped with IBM Rational ClearCase (CVE-2015-0138)
Security Bulletin: Vulnerabilities in OpenSSL affect Rational ClearCase (CVE-2014-3570, CVE-2014-3572, CVE-2015-0204)
Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Rational ClearCase (CVE-2015-0138, CVE-2014-6593, CVE-2015-0383, CVE-2015-0410)
The solution is to update to the latest fix pack.
Affected Versions
|
** Applying the fix**
—|—
8.0.1 through 8.0.1.7
| Install Rational ClearCase Fix Pack 8 (8.0.1.8) for 8.0.1
8.0 through 8.0.0.14
| Install Rational ClearCase Fix Pack 15 (8.0.0.15) for 8.0
7.1.2 through 7.1.2.17
7.1.1.x (all fix packs)
7.1.0.x (all fix packs)
| Customers on extended support contracts should install Rational ClearCase Fix Pack 18 (7.1.2.18) for 7.1.2
You should verify applying this fix does not cause any compatibility issues.
None