Lucene search

K
ibmIBM6AE69FBF41A1A71C6F22859F4A05C2D7A1361078C1DBC8F62EE6332B0FCF77D8
HistorySep 26, 2022 - 5:45 a.m.

Security Bulletin: IBM SPSS Modeler Premium - Text Analytics SSL Spoofing (CVE-2012-5785)

2022-09-2605:45:55
www.ibm.com
4

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.001 Low

EPSS

Percentile

24.0%

Abstract

Last updated on December 11, 2012.

When using the Text Analytics Server from the IBM SPSS Modeler Premium product with the SSL option enabled (default is disabled), then an SSL connection can be established without verifying the hostname of the target connection against the name on the SSL certificate. This could make the connection vulnerable to a man-in-the-middle attack.

Content

_CVE ID: _CVE-2012-5785

DESCRIPTION:
When using the Text Analytics Server from the IBM SPSS Modeler Premium product with the SSL option enabled (default is disabled), then an SSL connection can be established without verifying the hostname of the target connection against the name on the SSL certificate. This could make the connection vulnerable to a man-in-the-middle attack.

CVSS:
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/79830 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

AFFECTED PLATFORMS:

ยท Versions 14.2 through 15.0 of IBM SPSS Modeler Premium - Text Analytics running on all supported platforms are affected.

**REMEDIATION:**The recommended solution is to apply the fix as soon as practical. Please see below for information on the fixes available.

Fix:
For IBM SPSS Modeler Premium - Text Analytics:

For version 14.2
- Apply the SPSS Modeler Premium (Text Analytics) 14.2 Interim Fix 7 (14.2-IM-STA142TASC-All-IF007)

For version 15.0
- Apply the SPSS Modeler Premium (Text Analytics) 15.0 Fix Pack 1 or later fix pack

Workaround:
None known; apply fixes.

Mitigation:
ยท None known

REFERENCES:

_ยท _Complete CVSS Guide
_ยท _On-line Calculator V2_ _
ยท X-Force Vulnerability Database: Apache Axis2/Java SSL spoofing
ยท CVE-2012-5785

ACKNOWLEDGEMENT:

The vulnerability was reported to IBM by Martin Georgiev, Suman Jana and Vitaly Shmatikov University of Texas at Austin working on computer and network security

CHANGE HISTORY:

ยท 11 December 2012: Original copy published

_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _

_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an โ€œindustry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.โ€ IBM PROVIDES THE CVSS SCORES โ€œAS ISโ€ WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Related Information

Need more help? Our Modeler forum is Live!

[{โ€œProductโ€:{โ€œcodeโ€:โ€œSS3RA7โ€,โ€œlabelโ€:โ€œIBM SPSS Modelerโ€},โ€œBusiness Unitโ€:{โ€œcodeโ€:โ€œBU059โ€,โ€œlabelโ€:โ€œIBM Software w/o TPSโ€},โ€œComponentโ€:โ€œโ€“โ€,โ€œPlatformโ€:[{โ€œcodeโ€:โ€œPF025โ€,โ€œlabelโ€:โ€œPlatform Independentโ€}],โ€œVersionโ€:โ€œ15.0;14.2โ€,โ€œEditionโ€:โ€œโ€,โ€œLine of Businessโ€:{โ€œcodeโ€:โ€œLOB10โ€,โ€œlabelโ€:โ€œData and AIโ€}}]

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.001 Low

EPSS

Percentile

24.0%

Related for 6AE69FBF41A1A71C6F22859F4A05C2D7A1361078C1DBC8F62EE6332B0FCF77D8