Lucene search

K
ibmIBMC0340F2CD3C15616C3BA231CD2EB6366CEEBABBCB28179D9F1C77DF02E46D643
HistoryNov 20, 2018 - 11:15 p.m.

Security Bulletin: A Vulnerability in IBM Java SDK (April 2018) affecting IBM Application Delivery Intelligence V5.0.5 and V5.0.4 (CVE-2018-2783)

2018-11-2023:15:01
www.ibm.com
6

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

Summary

A vulnerability is identified in IBM® SDK Java™ Technology Edition Version 1.7 and Version 1.8 that are used by IBM Application Delivery Intelligence V5.0.4 and V5.0.5 respectively. This issue was disclosed as part of the IBM Java SDK updates in April 2018.

Vulnerability Details

CVEID: CVE-2018-2783 DESCRIPTION: An unspecified vulnerability in Oracle Java SE related to the Java SE, Java SE Embedded, JRockit Security component could allow an unauthenticated attacker to cause high confidentiality impact, high integrity impact, and no availability impact.
CVSS Base Score: 7.4
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/141939&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)

Affected Products and Versions

IBM Application Delivery Intelligence V5.0.4

IBM Application Delivery Intelligence V5.0.5

Remediation/Fixes

Obtain the latest Java JRE CPU update for the IBM Java SDK by using the following information.

ADI 5.0.5, Java 1.8

ADI 5.0.4, Java 1.7

  1. If you are running ADI V5.0.5, skip this step. For V5.0.4, complete the following substeps.
    1. Stop the server**.** Navigate to the server directory in your Rational product installation path and run this script: server.shutdown
    2. Modify the healthcenter parameter set.
    • Navigate to the server directory in your Rational product installation path, open the server.startup script by using your preferred text editor (e.g., Notepad for Windows or Vim Editor for Linux).
    • Search parameter -Dcom.ibm.java.diagnostics.healthcenter.agent in the server.startup script to find the line that contains the healthcenter parameter.
      NOTE: For some Rational Collaborative Lifecycle Management versions,_ -Dcom.ibm.java.diagnostics.healthcenter.agent_ parameter may not be found in the server.startup, in this case the update is not needed and you can start using your server.
    • Windows:
      Comment out the line (where the HEALTHCENTER_OPTS parameter is located) by inserting "rem " at the beginning of the line:

Before modification:
set HEALTHCENTER_OPTS=-agentlib:healthcenter **_…

After modification:_ **
rem set HEALTHCENTER_OPTS=-agentlib:healthcenter …
* Linux:
Comment out the line (where the HEALTHCENTER_OPTS parameter is located) by inserting "# " at the beginning of the line:

Before modification:
export HEALTHCENTER_OPTS="-agentlib:healthcenter **_…

After modification:_ **
# export HEALTHCENTER_OPTS="-agentlib:healthcenter …
3. Start the server**.** Navigate to the server directory in your Rational product installation path and run this script: server.startup
2. Upgrade your JRE by following the instructions in the link below:
How to update the IBM SDK for Java of IBM Rational products based on version 3.0.1.6 or later of IBM’s Jazz technology
3. Navigate to the server directory in your Rational product installation path, and go to jre/lib/security path.

1. Open the `java.security` file by using your preferred text editor (e.g., Notepad for Windows or Vim Editor for Linux).

2. Remove the MD5 option from the _jdk.jar.disabledAlgorithms_ parameter set:

  * **_Before modification:_**  

jdk.jar.disabledAlgorithms=MD2, MD5, RSA keySize < 1024

  * **_After modification:_**  

jdk.jar.disabledAlgorithms=MD2, RSA keySize < 1024

Workarounds and Mitigations

None

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N