Lucene search

K
ibmIBM2AD901EDEB585261E2DF33666A5B6A850B78BFF3E3C812EBA89023F529E41598
HistorySep 25, 2022 - 7:56 p.m.

Security Bulletin: Two security vulnerabilities found and fixed in WebSphere Business Events V7.0, V7.0.1 and 7.0.1.1 in the DesignData Tooling (CVE-2012-2190, CVE-2012-2191)

2022-09-2519:56:02
www.ibm.com
9

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

Abstract

A vulnerability in relation to Session ID Lengths and SSL/TLS Server has been discovered that impacts GSKit used with the Webshpere Business Events 7.0 product.

Content

VULNERABILITY DETAILS

CVE IDs: CVE-2012-2191 and CVE-2012-2190

DESCRIPTION

An error in the Global secure Toolkit (GSKIT), could cause a denial of service or a segmentation violation when specially-crafted SSL/TLS data is sent.

CVE ID: CVE-2012-2190**

CVSS:**
CVSS Base Score: 5
CVSS Temporal Score: see <https://exchange.xforce.ibmcloud.com/vulnerabilities/75996&gt;) for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:N/AC:L/Au:S/C:P/I:N/A:N)

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.

CVE ID: CVE-2012-2191 **
**CVSS:
CVSS Base Score: 5

CVSS Temporal Score: (<https://exchange.xforce.ibmcloud.com/vulnerabilities/75994&gt;) for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:N/AC:L/Au:S/C:P/I:N/A:N)

Note*: This is score is based on the assumption that 25 to 75 percent of deployed systems are impacted.

If greater than 75 percent then the score will jump to over 8.7

AFFECTED PLATFORMS:

Suse/Redhat- linux-x86_64
Suse/Redhat- linux-ppc64
Suse/Redhat- linux-ppc64_glibc23
Suse/Redhat- linux-s390_64
IBM- aix64
Solaris- sun64_x86

Non-Vulnerable Platforms
------------------------
Microsoft - Windows 32 and 64 bit
Solaris - Sun-sparc 32 and 64 bit
Solaris - Sun32_x86
Redhat/SUSE - Linux32
IBM - Aix32
Hewlett Packard - hpux32
Hewlett Packard - hpux64

REMEDIATION:
The recommended solution is to apply the appropriate ifix for this vulnerability. Apply latest IFIX that includes IV23081 to release 7.0. thru 7.0.1.1 from here:

In general, Websphere Business Events Product 7 fix packs can be downloaded by filing a PMR to gain access to an internal site. You may download the specific fix pack you need from the following:

Release APAR Download URL
FP14 IZ92338, IZ92160, IZ94070, IZ94473, IZ91514, IZ91162, IZ95759, IZ96129, IZ96969, IZ96970, IZ96973, IZ98846, IV00333, IZ97792, IZ97787, IV00765, IV01692, IV01737, IV02923, IV07893, IV10114, IV09812, IV11195, IV11399, IV11551, IV12186, IV14928, IV12060, IV18048, and IV23081. PMR specific location

Contact Technical Support:
In the United States and Canada dial 1-800-IBM-SERV
View the support contacts for other countries outside of the United States.
Electronically open a Service Request with WBE Technical Support.
**
Workaround:**
None known; apply fixes
**
Mitigation:**
Set GSK_V3_SIDCACHE_SIZE=0 and GSK_V2_SIDCACHE_SIZE=0 in the server process environment on vulnerable systems.

REFERENCES:
Complete CVSS Guide (<https://www.first.org/cvss/user-guide&gt;)
On-line Calculator V2 (http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2)
X-Force Vulnerability Database (<https://exchange.xforce.ibmcloud.com/vulnerabilities/75994&gt;)
X-Force Vulnerability Database (<https://exchange.xforce.ibmcloud.com/vulnerabilities/75996&gt;[](&lt;https://exchange.xforce.ibmcloud.com/vulnerabilities/75994&gt;))
CVE-2012-2190 (<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2190&gt;)
CVE-2012-2191 (<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2191&gt;)

CHANGE HISTORY:
<07/20/2012>: Original Copy Published
<09/12/2012>: Updated Copy Published**_

Note: _**According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an β€œindustry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES β€œAS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Related Information

IFIX IV23081

[{β€œProduct”:{β€œcode”:β€œSSTNLG”,β€œlabel”:β€œWebSphere Business Events”},β€œBusiness Unit”:{β€œcode”:β€œBU059”,β€œlabel”:β€œIBM Software w/o TPS”},β€œComponent”:β€œUsability”,β€œPlatform”:[{β€œcode”:β€œPF002”,β€œlabel”:β€œAIX”},{β€œcode”:β€œPF010”,β€œlabel”:β€œHP-UX”},{β€œcode”:β€œPF016”,β€œlabel”:β€œLinux”},{β€œcode”:β€œPF027”,β€œlabel”:β€œSolaris”},{β€œcode”:β€œPF033”,β€œlabel”:β€œWindows”},{β€œcode”:β€œPF035”,β€œlabel”:β€œz/OS”}],β€œVersion”:β€œ7.0.1.1;7.0.1;7.0”,β€œEdition”:β€œEdition Independent”,β€œLine of Business”:{β€œcode”:β€œLOB45”,β€œlabel”:β€œAutomation”}}]

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

Related for 2AD901EDEB585261E2DF33666A5B6A850B78BFF3E3C812EBA89023F529E41598