Lucene search

K
ibmIBM89DB701FDA8D57E716DB17DC1D2B06DF3EA63347FFD5556F145651826A5D4927
HistoryJun 17, 2018 - 12:09 p.m.

Security Bulletin: Vulnerability in SSLv3 affects IBM eDiscovery Analyzer (CVE-2014-3566)

2018-06-1712:09:05
www.ibm.com
69

3.4 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

Summary

SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled in IBM eDiscovery Analyzer

Vulnerability Details

CVE-ID: CVE-2014-3566

DESCRIPTION: Product could allow a remote attacker to obtain sensitive information, caused by a design error when using the SSLv3 protocol. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt SSL sessions and access the plaintext of encrypted connections.

CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/97013 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Affected Products and Versions

IBM eDiscovery Analyzer Version 2.1
IBM InfoSphere eDiscovery Analyzer Version 2.1.1
IBM eDiscovery Analyzer Version 2.2
IBM eDiscovery Analyzer Version 2.2.1
IBM eDiscovery Analyzer Version 2.2.2

Remediation/Fixes

The recommended solution is to apply the fix to the affected version, 2.2.2.1 as soon as practical. If you need further assistance, please contact IBM Support.

Go to Fix Central site and install the fix applicable to the version.

2.2.2.2 stream:

2.2.2.2-EDA-WIN-fp0002

2.2.2.2-EDA-AIX-fp0002

2.2.1.1 streams:

eDiscovery Analyzer

Workarounds and Mitigations

If you are on a version other than Version 2.2.2.1, apply the workaround.

IBM recommends that you review your entire environment to identify areas that enable the SSLv3 protocol and take appropriate mitigation and remediation actions. The most immediate mitigation action that can be taken is disabling SSLv3

To disable SSLv3 in all versions of IBM eDiscovery Analyzer, perform the following steps.

  1. Stop the IBM eDiscovery Analyzer server.

  2. Make a copy of the jetty.xml file. This file is located in the config directory in the location where IBM eDiscovery Analyzer was installed (on Windows the file will be in C:\Program Files (x86)\IBM\eDiscoveryAnalyzer\config by default, and on AIX it will be in /opt/IBM/eDiscoveryAnalyzer/config by default.)

  3. Open the original jetty.xml file (as located in the previous step) in a text editor.

  4. In the file, locate the following line:
    <New class="org.mortbay.jetty.security.SslSelectChannelConnector">

  5. Then locate this line within the scope of the “New” node located in the step above:
    <Set name="Protocol">SSLv3</Set>

  6. Change this line to be:
    <Set name="Protocol">``**TLSv1**``</Set>

  7. Save the jetty.xml file and exit the text editor.

  8. Start the IBM eDiscovery Analyzer server.

The steps above will disable SSLv3 and force the TLS protocol to be used in all HTTPS communications with IBM eDiscovery Analyzer.

3.4 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N