Lucene search

K
ibmIBMA6DB45BE52BE91B1CBFC465E3F144A5E777C058EC3442E31F43B5B3CC639342B
HistorySep 15, 2022 - 6:50 p.m.

Security Bulletin: Multiple vulnerabilities in the IBM SDK for Java™ Technology Edition April 2015 CPU affect WebSphere Process Server

2022-09-1518:50:43
www.ibm.com
27
ibm sdk java technology
websphere process server
vulnerabilities
upgrade
oracle java
ssl/tls
denial of service
freak attack
bar mitzvah attack

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.948

Percentile

99.3%

Summary

There are multiple vulnerabilities in IBM SDK for Java™ Technology Edition that is used by WebSphere Process Server. These issues were disclosed as part of the IBM SDK for Java Technology Edition updates in April 2015.

Vulnerability Details

CVEID: CVE-2015-0488 DESCRIPTION: An unspecified vulnerability in Oracle Java SE and Jrockit related to the JSSE component could allow a remote attacker to cause a denial of service.
CVSS Base Score: 5
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/102336&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVEID: CVE-2015-2808 DESCRIPTION: The RC4 algorithm, as used in the TLS protocol and SSL protocol, could allow a remote attacker to obtain sensitive information. An attacker could exploit this vulnerability to remotely expose account credentials without requiring an active man-in-the-middle session. Successful exploitation could allow an attacker to retrieve credit card data or other sensitive information. This vulnerability is commonly referred to as “Bar Mitzvah Attack”.
CVSS Base Score: 5
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/101851&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVEID: CVE-2015-1916 DESCRIPTION: Server applications which use the IBM Java Secure Socket Extension provider to accept SSL/TLS connections are vulnerable to a denial of service attack due to an unspecified vulnerability.
CVSS Base Score: 5
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/101995&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVEID: CVE-2015-0204 DESCRIPTION: A vulnerability in the OpenSSL ssl3_get_key_exchange function could allow a remote attacker to downgrade the security of certain TLS connections. An OpenSSL client accepts the use of an RSA temporary key in a non-export RSA key exchange ciphersuite. This could allow a remote attacker using man-in-the-middle techniques to facilitate brute-force decryption of TLS/SSL traffic between vulnerable clients and servers. This vulnerability is also known as the FREAK attack.
CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/99707&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Affected Products and Versions

  • WebSphere Process Server 6.1.x, 6.2.x, 7.0.x
  • WebSphere Process Server Hypervisor Editions V6.2, V7.0

General support for WebSphere Process Server ended 2015-04-30. Hypervisor editions are still in support until 2015-09-30. You are strongly advised to upgrade to a supported product such as IBM Business Process Manager Advanced Edition.

Remediation/Fixes

Install WebSphere Application Server interim fixes as appropriate for your current WebSphere Process Server version as described in the
Security Bulletin: Multiple vulnerabilities in IBM® Java SDK affect WebSphere Application Server April 2015 CPU document.

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmwebsphere_process_serverMatch7.0.0.5
OR
ibmwebsphere_process_serverMatch7.0.0.4
OR
ibmwebsphere_process_serverMatch7.0.0.3
OR
ibmwebsphere_process_serverMatch7.0.0.2
OR
ibmwebsphere_process_serverMatch7.0.0.1
OR
ibmwebsphere_process_serverMatch7.0
OR
ibmwebsphere_process_serverMatch6.2.0.3
OR
ibmwebsphere_process_serverMatch6.2.0.2
OR
ibmwebsphere_process_serverMatch6.2.0.1
OR
ibmwebsphere_process_serverMatch6.2
OR
ibmwebsphere_process_serverMatch6.1.2.3
OR
ibmwebsphere_process_serverMatch6.1.2.2
OR
ibmwebsphere_process_serverMatch6.1.2.1
OR
ibmwebsphere_process_serverMatch6.1.2
OR
ibmwebsphere_process_serverMatch6.1.0.4
OR
ibmwebsphere_process_serverMatch6.1.0.3
OR
ibmwebsphere_process_serverMatch6.1.0.2
OR
ibmwebsphere_process_serverMatch6.1.0.1
OR
ibmwebsphere_process_serverMatch6.1
OR
ibmwebsphere_process_serverMatch6.0.2.5
OR
ibmwebsphere_process_serverMatch6.0.2.4
OR
ibmwebsphere_process_serverMatch6.0.2.3
OR
ibmwebsphere_process_serverMatch6.0.2.2
OR
ibmwebsphere_process_serverMatch6.0.2.1
OR
ibmwebsphere_process_serverMatch6.0.2
OR
ibmwebsphere_process_serverMatch6.0.1.6
OR
ibmwebsphere_process_serverMatch6.0.1.5
OR
ibmwebsphere_process_serverMatch6.0.1.4
OR
ibmwebsphere_process_serverMatch6.0.1.3
OR
ibmwebsphere_process_serverMatch6.0.1.2
OR
ibmwebsphere_process_serverMatch6.0.1.1
OR
ibmwebsphere_process_serverMatch6.0.1
OR
ibmwebsphere_process_serverMatch6.0
OR
ibmwebsphere_process_serverMatch7.0
OR
ibmwebsphere_process_serverMatch7.0
OR
ibmwebsphere_process_serverMatch6.2
OR
ibmwebsphere_process_serverMatch7.0
OR
ibmwebsphere_process_serverMatch6.2

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.948

Percentile

99.3%