5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.003 Low
EPSS
Percentile
69.6%
A vulnerability has been identified in the GSKit 7 component utilized by Tivoli Directory Server (TDS) version 6.0, 6.1 or 6.2. A specifically crafted malformed SSL/TLS data packet can cause a TDS server using GSKit 7 to segmentation fault⦠Remediation for the issue consists of updating GSKit 7 to version 7.0.4.40 or higher.
VULNERABILITY DETAILS
CVE ID: CVE-2012-2190
DESCRIPTION:
When a client attempts to establish an SSL/TLS connection, the client and server negotiate what type of cypher suite to use and whether to trust each other. This negotiation is called the βhandshakeβ. TDS 6.0, 6.1 and 6.2 use GSKit 7 for SSL/TLS connections. GSKit 7 is vulnerable to an attack from a specifically crafted malformed SSL/TLS data packet during the handshake. An attacker would need to send a malformed data packet to the server during the SSL/TLS handshake negotiation. Were an attacker able to do so, they could cause the TDS server process to crash. The attack does not require local network access nor does it require authentication, but some degree of specialized knowledge and techniques are required. An exploit would not impact the confidentiality of information or the integrity of data, however accessibility of the system could be compromised.
CVSS Base Score: 5 CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/75994> for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
AFFECTED PLATFORMS
Tivoli Directory Server version 6.2 or earlier for 64-bit platforms excluding Windows and Solaris-SPARC. The following TDS platforms are vulnerable if they are not updated to use GSKit 7.0.4.40 or later.
Platform|
Bits
|
Vulnerable
| TDS versions
β|β|β|β
AIX|
64
|
Yes
| 6.0.0*-ITDS-AIX-*
6.1.0*-ITDS-AIX-*
6.2.0*-ITDS-AIX-*
HP-UX (IA64)|
64
|
Yes
| 6.0.0*-ITDS-HPUXIA64-*
6.1.0*-ITDS-HPUXIA64-*
6.2.0*-ITDS-HPUXIA64-*
HP-UX (PA-RISC)|
64
|
Yes
| 6.1.0*-ITDS-HPUXPARISC-*
Linux (x86-64)|
64
|
Yes
| 6.1.0*-ITDS-LinuxX64-*
6.2.0*-ITDS-LinuxX64-*
Linux i/p|
64
|
Yes
| 6.1.0*-ITDS-Linuxip-*
6.2.0*-ITDS-Linuxip-*
Linux s390|
64
|
Yes
| 6.1.0*-ITDS-Linuxz-*
6.2.0*-ITDS-Linuxz-*
Solaris (x86-64)|
64
|
Yes
| 6.0.0*-ITDS-SolarisX64-*
6.1.0*-ITDS-SolarisX64-*
6.2.0*-ITDS-SolarisX64-*
The following TDS platforms are NOT vulnerable:
Platform|
Bits
|
Vulnerable
| TDS versions
β|β|β|β
HP-UX (PA-RISC)|
32
|
No
| 6.0.0*-ITDS-HPUXPARISC-*
Linux (IA32)|
32
|
No
| 6.0.0*-ITDS-Linux32-*
6.1.0*-ITDS-Linux32-*
6.2.0*-ITDS-Linux32-*
Linux i/p|
32
|
No
| 6.0.0*-ITDS-Linuxip32-*
Linux s390|
31
|
No
| 6.0.0*-ITDS-Linuxz31-*
Solaris (SPARC)|
32
|
No
| 6.0.0*-ITDS-SolarisSparc-*
Solaris (SPARC)|
64
|
No
| 6.1.0*-ITDS-SolarisSparc-*
6.2.0*-ITDS-SolarisSparc-*
Windows (IA32)|
32
|
No
| 6.0.0*-ITDS-Win32-*
6.1.0*-ITDS-Win32-*
6.2.0*-ITDS-Win32-*
Windows (x86-64)|
64
|
No
| 6.1.0*-ITDS-WinX64-*
6.2.0*-ITDS-WinX64-*
REMEDIATION:
Tivoli Directory Server versions 6.0, 6.1 or 6.2 using GSKit 7 should update GSKit to version 7.0.4.40 or later. The following document explains how to obtain and install updates to GSKit 7 for Tivoli Directory Server:
GSKit V7 - Install, Uninstall and Upgrade instructions for Tivoli Directory Server
WORKAROUND(S):
The problem can be protected against by setting the following environment variables in the parent shell before starting Tivoli Directory Server:
GSK_V3_SIDCACHE_SIZE=0
GSK_V2_SIDCACHE_SIZE=0
MITIGATION(S):
See βWorkaround(s)β
REFERENCES:
Β· Complete CVSS Guide_ _
Β· CVSS on-line Calculator V2_ _
Β· X-Force Database
Β· CVE-2012-2190
RELATED INFORMATION:
Β· IBM Product Security Incident Response Program
Β· IBM Tivoli Directory Server Support
Date of Creation/Update | Summary of Changes |
---|---|
2012/10/04 | created |
_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _
_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an βindustry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.β IBM PROVIDES THE CVSS SCORES βAS ISβ WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
[{βProductβ:{βcodeβ:βSSVJJUβ,βlabelβ:βIBM Security Directory Serverβ},βBusiness Unitβ:{βcodeβ:βBU059β,βlabelβ:βIBM Software w/o TPSβ},βComponentβ:βGeneralβ,βPlatformβ:[{βcodeβ:βPF002β,βlabelβ:βAIXβ},{βcodeβ:βPF010β,βlabelβ:βHP-UXβ},{βcodeβ:βPF016β,βlabelβ:βLinuxβ},{βcodeβ:βPF027β,βlabelβ:βSolarisβ}],βVersionβ:β6.0;6.1;6.2β,βEditionβ:βAll Editionsβ,βLine of Businessβ:{βcodeβ:βLOB24β,βlabelβ:βSecurity Softwareβ}}]
XX04507
LDAP TDS ITDS IDS GSKit
CPE | Name | Operator | Version |
---|---|---|---|
ibm security directory server | eq | 6.0 | |
ibm security directory server | eq | 6.1 | |
ibm security directory server | eq | 6.2 |