Lucene search

K
ibmIBMAADD6DEC33FC746EA227DF8A2AB825F8DF3840C54CAEB51F15BD6D0541DB820C
HistoryJun 15, 2018 - 7:02 a.m.

Security Bulletin: Vulnerability in IBM Java runtime affects IBM SOA Policy Gateway Pattern for Red Hat Enterprise Linux Server (CVE-2015-0138)

2018-06-1507:02:46
www.ibm.com
3

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

Summary

The “FREAK: Factoring Attack on RSA-EXPORT keys" TLS/SSL client and server vulnerability may affect some configurations of WebSphere Application Server used by WebSphere Service Registry and Repository.

Vulnerability Details

CVEID: CVE-2015-0138 DESCRIPTION: A vulnerability in various IBM SSL/TLS implementations could allow a remote attacker to downgrade the security of certain SSL/TLS connections. An IBM SSL/TLS client implementation could accept the use of an RSA temporary key in a non-export RSA key exchange ciphersuite. This could allow a remote attacker using man-in-the-middle techniques to facilitate brute-force decryption of TLS/SSL traffic between vulnerable clients and servers.

This vulnerability is also known as the FREAK attack.

CVSS Base Score: 4.3
CVSS Temporal Score: See <http://exchange.xforce.ibmcloud.com/#/vulnerabilities/100691&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Affected Products and Versions

IBM SOA Policy Gateway Pattern for Red Hat Enterprise Linux Server 2.5 and 2.0

Remediation/Fixes

Please note that the default configuration of WebSphere Application Server and WebSphere Service Registry and Repository uses a “STRONG” or “HIGH” secure cipher list, which does not use RSA Export ciphers, so you would not be affected if you have not changed your ciphers.

For advice on mitigating FREAK on servers which deviate from this default configuration, please apply the mitigations indicated in the WebSphere Application Server bulletin at http://www.ibm.com/support/docview.wss?uid=swg21698613. You should verify applying this fix does not cause any compatibility issues.

Workarounds and Mitigations

You should verify applying this configuration change does not cause any compatibility issues.

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

Related for AADD6DEC33FC746EA227DF8A2AB825F8DF3840C54CAEB51F15BD6D0541DB820C