Lucene search

K
ibmIBM2C50142AFAF98D1A6DAAE0DCF60AF9902BA861EACEB35AD2405F8E31A1B54456
HistoryNov 07, 2018 - 5:10 a.m.

Security Bulletin: Vulnerabilities in IBM Java SDK (July 2018) affecting IBM Application Delivery Intelligence V5.0.5 and V5.0.4 (CVE-2016-0705, CVE 2017-3732, CVE 2017-3736, and CVE-2018-2973)

2018-11-0705:10:01
www.ibm.com
6

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

Summary

Multiple vulnerabilities are identified in IBM® SDK Java™ Technology Edition Version 1.7 and Version 1.8 that are used by IBM Application Delivery Intelligence V5.0.4 and V5.0.5 respectively. These issues were disclosed as part of the IBM Java SDK updates in July 2018.

Vulnerability Details

CVEID: CVE-2016-0705 DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by a double-free error when parsing DSA private keys. An attacker could exploit this vulnerability to corrupt memory and cause a denial of service.
CVSS Base Score: 3.7
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/111140&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2017-3732 DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive information, caused by a carry propagating bug in the x86_64 Montgomery squaring procedure. An attacker could exploit this vulnerability to obtain information about the private key.
CVSS Base Score: 5.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/121313&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2017-3736 DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive information, caused by a carry propagation flaw in the x86_64 Montgomery squaring function bn_sqrx8x_internal(). An attacker with online access to an unpatched system could exploit this vulnerability to obtain information about the private key.
CVSS Base Score: 5.9
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/134397&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID: CVE-2018-2973 DESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java SE, Java SE Embedded JSSE component could allow an unauthenticated attacker to cause no confidentiality impact, high integrity impact, and no availability impact.
CVSS Base Score: 5.9
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/146835&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)

Affected Products and Versions

IBM Application Delivery Intelligence V5.0.4

IBM Application Delivery Intelligence V5.0.5

Remediation/Fixes

Obtain the latest Java JRE CPU update for the IBM Java SDK by using the following information.

ADI 5.0.5, Java 1.8

ADI 5.0.4, Java 1.7

  1. If you are running ADI V5.0.5, skip this step. For V5.0.4, complete the following substeps.
    1. Stop the server**.** Navigate to the server directory in your Rational product installation path and run this script: server.shutdown
    2. Modify the healthcenter parameter set.
    • Navigate to the server directory in your Rational product installation path, open the server.startup script by using your preferred text editor (e.g., Notepad for Windows or Vim Editor for Linux).
    • Search parameter -Dcom.ibm.java.diagnostics.healthcenter.agent in the server.startup script to find the line that contains the healthcenter parameter.
      NOTE: For some Rational Collaborative Lifecycle Management versions,_ -Dcom.ibm.java.diagnostics.healthcenter.agent_ parameter may not be found in the server.startup, in this case the update is not needed and you can start using your server.
    • Windows:
      Comment out the line (where the HEALTHCENTER_OPTS parameter is located) by inserting "rem " at the beginning of the line:

Before modification:
set HEALTHCENTER_OPTS=-agentlib:healthcenter **_…

After modification:_ **
rem set HEALTHCENTER_OPTS=-agentlib:healthcenter …
* Linux:
Comment out the line (where the HEALTHCENTER_OPTS parameter is located) by inserting "# " at the beginning of the line:

Before modification:
export HEALTHCENTER_OPTS="-agentlib:healthcenter **_…

After modification:_ **
# export HEALTHCENTER_OPTS="-agentlib:healthcenter …
3. Start the server**.** Navigate to the server directory in your Rational product installation path and run this script: server.startup
2. Upgrade your JRE by following the instructions in the link below:
How to update the IBM SDK for Java of IBM Rational products based on version 3.0.1.6 or later of IBM’s Jazz technology
3. Navigate to the server directory in your Rational product installation path, and go to jre/lib/security path.

1. Open the `java.security` file by using your preferred text editor (e.g., Notepad for Windows or Vim Editor for Linux).

2. Remove the MD5 option from the _jdk.jar.disabledAlgorithms_ parameter set:

  * **_Before modification:_**  

jdk.jar.disabledAlgorithms=MD2, MD5, RSA keySize < 1024

  * **_After modification:_**  

jdk.jar.disabledAlgorithms=MD2, RSA keySize < 1024

Workarounds and Mitigations

None

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C