Lucene search

K
ibmIBM098E1724D0D22BD8E0B54429E8D6B7A2A5B2B8403A792BB9788E96F4B4565340
HistoryJul 10, 2018 - 8:34 a.m.

Security Bulletin: Vulnerabilities in GSKit affect IBM Rational ClearCase (CVE-2015-0138)

2018-07-1008:34:12
www.ibm.com
9

5.4 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:P/A:C

Summary

GSKit is an IBM component that is used by IBM Rational ClearCase. The GSKit that is shipped with IBM Rational ClearCase contains multiple security vulnerabilities including the “FREAK: Factoring Attack on RSA-EXPORT keys" TLS/SSL client and server vulnerability. IBM Rational ClearCase has addressed the applicable CVEs.

Vulnerability Details

CVEID: CVE-2015-0138 DESCRIPTION: A vulnerability in various IBM SSL/TLS implementations could allow a remote attacker to downgrade the security of certain SSL/TLS connections. An IBM SSL/TLS client implementation could accept the use of an RSA temporary key in a non-export RSA key exchange ciphersuite. This could allow a remote attacker using man-in-the-middle techniques to facilitate brute-force decryption of TLS/SSL traffic between vulnerable clients and servers.

This vulnerability is also known as the FREAK attack.

CVSS Base Score: 4.3
CVSS Temporal Score: See http://exchange.xforce.ibmcloud.com/#/vulnerabilities/100691 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Affected Products and Versions

Rational ClearCase 7.1.2.9 through 7.1.2.17, 8.0.0.4 through 8.0.0.14, and 8.0.1 through 8.0.1.7.
The IBM GSKit is used if ClearCase on Windows platforms is configured to integrate with IBM Rational ClearQuest, Rational Team Concert, or Jira with communication over SSL (https). This applies to any integration using Change Management Interface (CMI), and to non-CMI based UCM-enabled CQ integration via OSLC. If your ClearCase deployment is not using these integrations, or not using SSL with the integrations, then your deployment is not sensitive to this attack. The UCM-enabled CQ integration without using OSLC (SQUID) is not sensitive to this attack.
CMI and OSLC integrations

ClearCase Windows Client Version

|

Status

—|—

8.0.1 through 8.0.1.7

|

Affected if you use CMI or OSLC integrations

8.0.0.4 through 8.0.0.14

|

Affected if you use CMI or OSLC integrations

8.0 through 8.0.0.3

|

Not affected

7.1.2.9 through 7.1.2.16

|

Affected if you use CMI or OSLC integrations

7.1.2 through 7.1.2.8

|

Not affected

7.0.x, 7.1.0.x, 7.1.1.x

|

Not affected

**Note:**other components of ClearCase are subject to the “FREAK” attack, as disclosed in the following security bulletins:
Security Bulletin: A security vulnerability has been identified in IBM WebSphere Application Server shipped with IBM Rational ClearCase (CVE-2015-0138)
Security Bulletin: Vulnerabilities in OpenSSL affect Rational ClearCase (CVE-2014-3570, CVE-2014-3572, CVE-2015-0204)
Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Rational ClearCase (CVE-2015-0138, CVE-2014-6593, CVE-2015-0383, CVE-2015-0410)

Remediation/Fixes

The solution is to update to the latest fix pack.

Affected Versions

|

** Applying the fix**

—|—

8.0.1 through 8.0.1.7

| Install Rational ClearCase Fix Pack 8 (8.0.1.8) for 8.0.1

8.0 through 8.0.0.14

| Install Rational ClearCase Fix Pack 15 (8.0.0.15) for 8.0

7.1.2 through 7.1.2.17
7.1.1.x (all fix packs)
7.1.0.x (all fix packs)

| Customers on extended support contracts should install Rational ClearCase Fix Pack 18 (7.1.2.18) for 7.1.2

You should verify applying this fix does not cause any compatibility issues.

Workarounds and Mitigations

None

5.4 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:P/A:C