Lucene search

K
ibmIBM427CB674B90E46595CCF47CE3F7B96DB6F284BAB268AAB1D3B45FBF790BB62BA
HistoryJul 10, 2018 - 8:34 a.m.

Security Bulletin: Vulnerabilities in cURL component shipped with IBM Rational ClearCase (CVE-2016-8624, CVE-2016-8625)

2018-07-1008:34:12
www.ibm.com
40

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

Summary

IBM Rational ClearCase is affected by cURL/libcURL access restriction bypass and network host spoofing vulnerabilities.

Vulnerability Details

CVEID: CVE-2016-8624**
DESCRIPTION:** cURL/libcurl could allow a remote attacker to bypass security restrictions, caused by the failure to parse the authority component of the URL when handling ‘#’ character. By using a specially-crafted URL with ‘#’ character, an attacker could exploit this vulnerability to bypass access restrictions.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/118642 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVEID: CVE-2016-8625**
DESCRIPTION:** cURL/libcurl could provide weaker than expected security, caused by the translation of International Domain Names (IDNA) to puny code for DNS resolving using the IDNA 2003 standard. An attacker could exploit this vulnerability to issue network transfer requests to the wrong host.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/118644 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

Affected Products and Versions

The cURL component is used in the CMI integration, the OSLC-based ClearQuest integration, and in the automatic view client.

ClearCase client version

|

Status

—|—

9.0 through 9.0.0.3

|

Affected

8.0.1 through 8.0.1.13

|

Affected

8.0 through 8.0.0.20

|

Affected

7.1.2 through 7.1.2.19

|

Affected

7.1 through 7.1.1.9

|

Not affected

Remediation/Fixes

The solution is to upgrade to a fix pack of ClearCase that has a fix in the cURL component. The fixes contain cURL version 7.52.1.

Affected Versions

|

** Applying the fix**

—|—

9.0 through 9.0.0.3

| Install Rational ClearCase Fix Pack 4 (9.0.0.4) for 9.0

8.0.1 through 8.0.1.13

| Install Rational ClearCase Fix Pack 14 (8.0.1.14) for 8.0.1

8.0 through 8.0.0.20

| Install Rational ClearCase Fix Pack 21 (8.0.0.21) for 8.0

7.1.2 through 7.1.2.19

| Customers on extended support contracts should contact Customer Support for information.

Workarounds and Mitigations

None

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N