Lucene search

K
ibmIBM57C16E3BD2286320928A05596A968D22220B643925F26C41E1EC7F23BC8C4E85
HistorySep 11, 2019 - 1:07 a.m.

Security Bulletin: Spectrum Protect Operations Center vulnerable to Logjam (CVE-2015-4000)

2019-09-1101:07:40
www.ibm.com
14

3.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

Summary

A port used by Operations Center is reported to be vulnerable to Logjam (CVE-2015-4000).

Vulnerability Details

CVEID: CVE-2015-4000 DESCRIPTION: The TLS protocol could allow a remote attacker to obtain sensitive information, caused by the failure to properly convey a DHE_EXPORT ciphersuite choice. An attacker could exploit this vulnerability using man-in-the-middle techniques to force a downgrade to 512-bit export-grade cipher. Successful exploitation could allow an attacker to recover the session key as well as modify the contents of the traffic. This vulnerability is commonly referred to as “Logjam”.
CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/103294&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Affected Products and Versions

IBM Spectrum Protect Operations Center affected levels are 8.1.3 through 8.1.7. Note that 7.1 is not affected.

Remediation/Fixes

IBM Spectrum Protect
Operations Center Release
| First Fixing
VRM Level
| APAR | Platform | Link to Fix
—|—|—|—|—
8.1 | 8.1.8 | IT30213 | AIX
Linux
Windows |

<https://www.ibm.com/support/docview.wss?uid=ibm10888465&gt;

Workarounds and Mitigations

IBM Spectrum Protect Operations Center 8.1.3 through 8.1.7, can add the following statements to the java security file (/opt/tivoli/tsm/jre/lib/security/java.security) to eliminate exposure to this vulnerability:

jdk.certpath.disabledAlgorithms=MD2,MD5,SHA1 usage TLSServer TLSClient SignedJAR, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 256, DSS

jdk.tls.disabledAlgorithms=SSLv3, TLSv1, TLSv1.1, DH keySize < 2048, EC keySize < 256, DSS, 3DES_EDE_CBC, DES, DESede, RC4, MD5, SHA1, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384, anon, NULL, GCM

jdk.tls.ephemeralDHKeySize=2048

jdk.tls.rejectClientInitiatedRenegotiation=true

CPENameOperatorVersion
ibm spectrum protecteq8.1

3.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N