Lucene search

K
ibmIBM0A4F3737262891FF4C6D462EA30AC30DD6640CCFA7955B9831CF369AB9F851B2
HistorySep 29, 2018 - 6:04 p.m.

Security Bulletin: Brute-force attack in ClearQuest Web (CVE-2014-3101)

2018-09-2918:04:03
www.ibm.com
5

0.003 Low

EPSS

Percentile

71.3%

Summary

IBM Rational ClearQuest Web is vulnerable to brute-force attack.

Vulnerability Details

CVE ID:CVE-2014-3101

**Description:**IBM Rational ClearQuest (CQ) could allow a remote attacker to bypass security restrictions, caused by an error in the login form. An attacker could exploit this vulnerability using brute-force techniques to gain access to a user’s account.

CVSS Base Score: 4.3 **CVSS Temporal Score:**See <https://exchange.xforce.ibmcloud.com/vulnerabilities/94268&gt; for the current score *CVSS Environmental Score:**Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Affected Products and Versions

ClearQuest version

| Status
—|—
8.0.1 through 8.0.1.4| Affected
8.0 through 8.0.0.11| Affected
7.1.2 through 7.1.2.14| Affected
7.1.0.x, 7.1.1.x (all versions and fix packs)| Affected

Remediation/Fixes

Customers have been able to choose to use LDAP (Lightweight Directory Access Protocol) with a password policy (lock out the account after several login failures) to prevent brute-force attacks specifically for LDAP authenticated CQ accounts. Customers can implement this on any version of ClearQuest with LDAP authenticated user accounts. However, not all accounts are typically LDAP-enabled.

As of ClearQuest Fix Pack 6 (8.0.1.6) for 8.0.1, a built-in mechanism for brute-force protection is available that includes account lock outs. It must be configured and enabled against a Feature Level 9 upgraded database for it to take effect. For more information about this new protection feature, see How to protect your ClearQuest deployment from brute-force password attacks.

*For ClearQuest 8.0.1.5, 8.0.0.12, 7.1.2.15 and newer, a one second delay is added after the login failure. This is intended to assist in delaying an attacker while giving the ClearQuest administrator more time to detect the attack and take action. This delay cannot completely prevent a brute-force attack, andcustomers are strongly recommended to upgrade to ClearQuest 8.0.1.6 with database Feature Level 9, or newer so they can configure and use the built-in brute-force protection. Customers must make their own determination as to the risk any security vulnerability applies to their business organization’s environment and tolerance levels.

Note: ClearQuest database Feature Level upgrades have the benefit of permanently blocking earlier product versions that do not support that Feature Level. To obtain a list of supported Feature Levels in your client, run the installutil showfeaturelevels command.

Additional enhancements have been provided, by upgrading to one of the following releases or higher: Affected Versions Applying the fix Enhacement provided:
8.0.1.x Install Rational ClearQuest Fix Pack 6 (8.0.1.6) for 8.0.1

Workarounds and Mitigations

See above regarding usage of LDAP with a lockout password policy for LDAP-enabled CQ user accounts. This will not protect CQ user accounts that are not LDAP-enabled.

0.003 Low

EPSS

Percentile

71.3%

Related for 0A4F3737262891FF4C6D462EA30AC30DD6640CCFA7955B9831CF369AB9F851B2