Lucene search

K
ibmIBM848F1EF180A8D7C9F78282B090CD1004AE18552A7CA5356CED8A52112947B209
HistoryJan 31, 2019 - 1:35 a.m.

Security Bulletin: Vulnerabilities in SSLv3 and OpenSSL affect System x Integrated Management Module (IMM1) (CVE-2014-3566, CVE-2014-3568)

2019-01-3101:35:01
www.ibm.com
13

3.4 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

Summary

SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. This bulletin addresses the POODLE issue which affected the IMM1 as well as another issue in OpenSSL disclosed in October 2014.

Vulnerability Details

Abstract

SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. This bulletin addresses the POODLE issue which affected the IMM1 as well as another issue in OpenSSL disclosed in October 2014.

Content

Vulnerability Details:

CVE-ID: CVE-2014-3566

Description: The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the “POODLE” issue.

CVSS Base Score: 4.3
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/97013&gt; for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVE-ID: CVE-2014-3568

Description: OpenSSL could allow a remote attacker bypass security restrictions. When configured with “no-ssl3” as a build option, servers could accept and complete a SSL 3.0 handshake. An attacker could exploit this vulnerability to perform unauthorized actions.

CVSS Base Score: 2.6
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/97037&gt; for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:H/Au:N/C:N/I:P/A:N)

Affected products and versions

The following IMM code levels exhibit this issue:

  • All versions 1.00 to 1.46

The following platforms are be affected:

  • System x3500 M2, Type 7839, any model
  • System x3500 M3, Type 7380, any model
  • System x3550 M2, Type 4198, any model
  • System x3550 M2, Type 7946, any model
  • System x3550 M3, Type 4254, any model
  • System x3550 M3, Type 7944, any model
  • System x3630 M3, Type 7377, any model
  • System x3650 M2, Type 4199, any model
  • System x3650 M2, Type 7947, any model
  • System x3650 M3, Type 4255, any model
  • System x3650 M3, Type 5454, any model
  • System x3650 M3, Type 7945, any model
  • System x3690 X5, Type 7147, any model
  • System x3690 X5, Type 7148, any model
  • System x3690 X5, Type 7149, any model
  • System x3690 X5, Type 7192, any model
  • System x3850 X5, Type 7143, any model
  • System x3850 X5, Type 7145, any model
  • System x3850 X5, Type 7146, any model
  • System x3850 X5, Type 7191, any model
  • System x3950 X5, Type 7143, any model
  • System x3950 X5, Type 7145, any model
  • System x iDataPlex dx360 M2, Types 6380, any model
  • System x iDataPlex dx360 M2, Types 7321, any model
  • System x iDataPlex dx360 M2, Types 7323, any model
  • System x iDataPlex dx360 M3, Types 6391, any model

Remediation/Fixes:

It’s recommended to update IMM to 1.47 YUOOG7C or later. Firmware updates are available through IBM Fix Central.

In addition to updating to the recommended firmware version, the following configuration change is required using one of the two options described below:

Through the IMM web interface, on the IMM Security page, select “High Security Mode” in the “Cryptography Management” section.

-OR-

Use the following ASU command: asu set imm.ssl_cipher “high security mode”

After configuration change, restart the IMM for the configuration to take effect.

Workaround(s) & Mitigation(s):

It’s suggested to disable the SSL 3.0 in the web browser side.

3.4 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N