Lucene search

K
ibmIBMBCFE8218A2ED217DF7B3CEBA4BCE69B841D35B128C1B2363B0C2604F1B230E92
HistorySep 29, 2018 - 6:04 p.m.

Security Bulletin: Multiple vulnerabilities in OpenSSL affect Rational ClearQuest (CVE-2014-5139, CVE-2014-3509, CVE-2014-3511)

2018-09-2918:04:03
www.ibm.com
8

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

Summary

There are multiple vulnerabilities in OpenSSL affecting IBM Rational ClearQuest. These issues were disclosed on August 6, 2014 by the OpenSSL Project.

Vulnerability Details

| Subscribe to My Notifications to be notified of important product support alerts like this.

  • Follow this link for more information (requires login with your IBM ID)
    —|—

CVE-ID: CVE-2014-5139

Description: OpenSSL is vulnerable to a denial of service, caused by a NULL pointer dereference when an SRP ciphersuite is specified without being properly negotiated with the client. A remote attacker could exploit this vulnerability to cause the client to crash.

**CVSS Base Score:**5
**CVSS Temporal Score:**See <https://exchange.xforce.ibmcloud.com/vulnerabilities/95166&gt; for more information
*CVSS Environmental Score:**Undefined
CVSS Vector:(AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-ID: CVE-2014-3511

Description: OpenSSL could allow a remote attacker to bypass security restrictions, caused by the negotiation of TLS 1.0 instead of higher protocol versions by the OpenSSL SSL/TLS server code when handling a badly fragmented ClientHello message. An attacker could exploit this vulnerability using man-in-the-middle techniques to force a downgrade to TLS 1.0.

CVSS Base Score: 4.3 **CVSS Temporal Score:**See <https://exchange.xforce.ibmcloud.com/vulnerabilities/95162&gt; for more information *CVSS Environmental Score:**Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVE-ID: CVE-2014-3509

Description: OpenSSL is vulnerable to a denial of service, caused by a race condition in the ssl_parse_serverhello_tlsext() code. If a multithreaded client connects to a malicious server using a resumed session, a remote attacker could exploit this vulnerability to cause a denial of service.

CVSS Base Score: 4.3 **CVSS Temporal Score:**See <https://exchange.xforce.ibmcloud.com/vulnerabilities/95159&gt; for more information *CVSS Environmental Score:**Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)

Affected Products and Versions

IBM Rational ClearQuest versions:

  • 7.1.0.x (any version)
  • 7.1.1.x (any version)
  • 7.1.2 through** **7.1.2.15
  • 8.0 through 8.0.0.12
  • 8.0.1 through 8.0.1.5.

OpenSSL is embedded in cqperl and ratlperl. You are vulnerable if you use OpenSSL in ClearQuest hooks or ratlperl/cqperl scripts.

Remediation/Fixes

Apply a fix pack for your appropriate release of ClearQuest. These fix packs include OpenSSL 1.0.1i.

Affected Versions

|

** Applying the fix**

—|—

8.0.1.x

| Install Rational ClearQuest Fix Pack 6 (8.0.1.6)

8.0.0.x

| Install Rational ClearQuest Fix Pack 13 (8.0.0.13)

7.1.2.x
7.1.1.x
7.1.0.x

| Customers with extended support contracts should install Rational ClearQuest Fix Pack 16 (7.1.2.16)

Workarounds and Mitigations

Disable any ratlperl or cqperl scripts and hooks that use SSL until you apply the fixes listed above.

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P