7.1 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
A vulnerability in IBM Rational RequisitePro in relation to TLS Record Processing has been discovered related to TLS 1.0 and later which can result in high CPU utilization that requires a system reboot to resolve.
| Subscribe to My Notifications to be notified of important product support alerts like this.
CVE ID:CVE-2014-0963
**
Description**: A vulnerability in relation to TLS Record Processing has been discovered related to TLS 1.0 and later which can result in high CPU utilization.
RequisitePro uses GSKit when supporting SSL (https) connections.
Note: this vulnerability affects RequisiteProonlyif your IBM HTTP server is configured to enable mod_reqtimeout. This is not the default configuration. If you do not use mod_reqtimeout, you are**not **vulnerable.
CVSS Base Score: 7.1 CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/92844> for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:C)
IBM Rational RequisitePro versions 7.1, 7.1.0.1 through 7.1.0.2, 7.1.1 through 7.1.1.9, 7.1.2 through** **7.1.2.13.01, 7.1.3 through 7.1.3.10.01, and 7.1.4 through 7.1.4.3.01
Install fixes to your IBM HTTP Server, if you use SSL.
Review security bulletin 1672843: IBM HTTP Server CPU utilization (CVE-2014-0963) for additional vulnerability details and fixes.
Affected Versions
|
Applying the fix
—|—
7.1, 7.1.0.x, 7.1.1.x and 7.1.2.x| Document 1390803 explains how to update IBM HTTP Server for IBM Rational ClearCase WAN servers at release 7.1.x; the same process applies for RequisitePro. Consult those instructions when applying the IHS interim fix or fix pack containing the fix, as listed in the security bulletin referenced above.
7.1.3.x and 7.1.4.x| Upgrade IBM HTTP Server to a version including the fix, or install the IHS interim fix. Consult the security bulletin referenced above for the fixes relevant for your version of IHS.
Monitor CPU utilization of your RequisitePro server instances. If utilization becomes abnormally high, stop and restart the affected instance.
Follow the guidance in security bulletin 1672843 to change your configuration of IHS to avoid the problem.