Public disclosed vulnerability from Nimbus-JOSE-JWT affects IBM Spectrum LSF
CVE-2017-16007 (BDSA-2017-0101)
Nimbus JOSE+JWT implemented the ECDH-ES encryption option of the ‘JSON Web Encryption’ standard in a way that is vulnerable to cryptanalysis. This would enable an attacker to determine the private key of the server, allowing them to recover or modify communications of other parties via a man-in-the-middle attack.
CVE-2017-12972
In Nimbus JOSE+JWT before 4.39, there is no integer-overflow check when converting length values from bytes to bits, which allows attackers to conduct HMAC bypass attacks by shifting Additional Authenticated Data (AAD) and ciphertext so that different plaintext is obtained for the same HMAC.
CVE-2017-12974
Nimbus JOSE+JWT before 4.36 proceeds with ECKey construction without ensuring that the public x and y coordinates are on the specified curve, which allows attackers to conduct an Invalid Curve Attack in environments where the JCE provider lacks the applicable curve validation.
IBM Spectrum LSF 10.0.0.4
IBM Spectrum LSF 10.0.0.5
IBM Spectrum LSF 10.0.0.6
IBM Spectrum LSF 10.0.0.7
Remediation/Fixes
Product | VRMF | APAR | Remediation / First Fix |
---|---|---|---|
LSF | 10.1.0.4 | None | See fix below |
LSF | 10.1.0.5 | None | See fix below |
LSF | 10.1.0.6 | None | See fix below |
LSF | 10.1.0.7 | None | See fix below |
Download Fix 512358 from the following location:
http://www.ibm.com/support/fixcentral/swg/selectFixes?product=ibm/Other+software/IBM+Spectrum+LSF&release=All&platform=All&function=fixId&fixids=lsf-10.1-build512358&includeSupersedes=0
Go to the patch install directory: cd $LSF_ENVDIR/…/10.1/install/
Copy the patch file to the install directory $LSF_ENVDIR/…/10.1/install/
Run patchinstall: ./patchinstall <patch>
Run “badmin mbdrestart”
CPE | Name | Operator | Version |
---|---|---|---|
ibm spectrum lsf | eq | any |