7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
OpenSSL vulnerabilities were disclosed on January 26, 2017 by the OpenSSL Project. OpenSSL is used by IBM InfoSphere Information Server. IBM InfoSphere Information Server has addressed the applicable CVEs.
CVEID: CVE-2017-3731 DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by an out-of-bounds read when using a specific cipher. By sending specially crafted truncated packets, a remote attacker could exploit this vulnerability using CHACHA20/POLY1305 to cause the application to crash.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/121312 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
CVEID: CVE-2017-3732 DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive information, caused by a propagation error in the BN_mod_exp() function. An attacker could exploit this vulnerability to obtain information about the private key.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/121313 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
CVEID: CVE-2016-7055 DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by an error in a Broadwell-specific Montgomery multiplication procedure. By sending specially crafted data, a remote attacker could exploit this vulnerability to trigger errors in public-key operations in configurations where multiple remote clients select an affected EC algorithm and cause a denial of service.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/118748 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
The following products, running on all supported platforms, are affected:
IBM InfoSphere Information Server: versions 9.1, 11.3, 11.5 and 11.7
IBM InfoSphere Information Server on Cloud: version 11.5
Product | VRMF | APAR | Remediation/First Fix |
---|---|---|---|
InfoSphere Information Server | 11.7 | JR57654 | --Upgrade to DataDirect ODBC drivers version 7.1.6 |
--Use TechNote to choose which OpenSSL version the drivers will use | |||
--Use TechNote to follow additional post installation configuration steps | |||
InfoSphere Information Server, Information Server on Cloud | 11.5 | JR57654 | --Upgrade to DataDirect ODBC drivers version 7.1.6 |
--Use TechNote to choose which OpenSSL version the drivers will use | |||
--Use TechNote to follow additional post installation configuration steps | |||
InfoSphere Information Server | 11.3 | JR57654 | --Upgrade to DataDirect ODBC drivers version 7.1.6 |
--Use TechNote to choose which OpenSSL version the drivers will use | |||
--Use TechNote to follow additional post installation configuration steps | |||
InfoSphere Information Server | 9.1 | JR57654 | --Upgrade to DataDirect ODBC drivers version 7.1.6 |
--Use TechNote to choose which OpenSSL version the drivers will use | |||
--Use TechNote to follow additional post installation configuration steps |
For IBM InfoSphere Information Server version 8.7, IBM recommends upgrading to a fixed, supported version/release/platform of the product.
CVE-2017-3731 –Disable RC4 and MD5 cipher suites.
CVE-2017-3732 –Avoid or disable DHE cipher suites.
Cipher suites can be disabled by using the hidden connection option “CipherList”. This controls which cipher suites can be used by the driver. For information on the format of CipherList, refer to https://www.openssl.org/docs/man1.0.2/apps/ciphers.html
For example, to disable the RC4 and MD5, specify the following value for the undocumented CipherList connection option:
CipherList=DEFAULT:-RC4:-MD5
If you have already specified a value for CipherList, add the following to the existing value:
DEFAULT:-RC4:-MD5
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P