4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
Transport Layer Security (TLS) padding vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) like attack affects TPF Toolkit.
CVE-ID: CVE-2014-8730
DESCRIPTION: Product could allow a remote attacker to obtain sensitive information, caused by the failure to check the contents of the padding bytes when using CBC cipher suites of some TLS implementations. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) like attack to decrypt sensitive information and calculate the plaintext of secure connections.
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/99216 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)
TPF Toolkit 3.6.x, 4.0.x, and 4.2.x
All current versions of TPF Toolkit ship JREs that are not impacted by this vulnerability. However, TPF Toolkit provides a Remote System Explorer (RSE) daemon that runs on Linux for System z. This daemon relies on the Java that is installed on that system. Ensure that the Java level currently installed on your Linux for System z system is up to date. The minimum level of Java that is required includes the fix for vulnerability CVE-2013-0169.
None
CPE | Name | Operator | Version |
---|---|---|---|
tpf toolkit | eq | 3.6.0 | |
tpf toolkit | eq | 3.6.1 | |
tpf toolkit | eq | 3.6.2 | |
tpf toolkit | eq | 3.6.3 | |
tpf toolkit | eq | 3.6.4 | |
tpf toolkit | eq | 3.6.5 | |
tpf toolkit | eq | 4.0.0 | |
tpf toolkit | eq | 4.0.1 | |
tpf toolkit | eq | 4.0.2 | |
tpf toolkit | eq | 4.0.3 |