Lucene search

K
ibmIBMC93810737B3A9011D99C779B457DD2804810F029C1CFDF10E0422BE2BEB65D2D
HistoryJun 16, 2018 - 7:40 p.m.

Security Bulletin: IBM WebSphere Transformation Extender Secure Adapter Collection vulnerabilities: RSA BSAFE-C (CVE-2014-4191, CVE-2014-4192) and SSLv3 (CVE-2014-3566)

2018-06-1619:40:57
www.ibm.com
25

0.975 High

EPSS

Percentile

100.0%

Summary

EMC RSA BSAFE-C Toolkits, utilized by WebSphere Transformation Extender Secure Adapter Collection, could allow a remote attacker to obtain sensitive information.

Additionally, SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled in WebSphere Transformation Extender Secure Adapter Collection.

Vulnerability Details

CVE ID:CVE-2014-4192

Description: EMC RSA BSAFE-C Toolkits could allow a remote attacker to obtain sensitive information, caused by the processing of certain requests for output bytes by the Dual_EC_DRBG implementation. By recovering the algorithm’s inner state, an attacker could exploit this vulnerability to obtain sensitive information.

CVSS Base Score: 5 **CVSS Temporal Score:**See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93832&gt;[](&lt;https://exchange.xforce.ibmcloud.com/vulnerabilities/92844&gt;) for the current score *CVSS Environmental Score:**Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVE ID:CVE-2014-4191

Description: EMC RSA BSAFE-C Toolkits could allow a remote attacker to obtain sensitive information, caused by the sending of a long series of random bytes during use of the Dual_EC_DRBG algorithm by the TLS implementation. By recovering the algorithm’s inner state, an attacker could exploit this vulnerability to obtain sensitive information.

CVSS Base Score: 5 **CVSS Temporal Score:**See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93833&gt; for the current score *CVSS Environmental Score:**Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVE-ID: CVE-2014-3566

DESCRIPTION: Product could allow a remote attacker to obtain sensitive information, caused by a design error when using the SSLv3 protocol. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt SSL sessions and access the plaintext of encrypted connections.

CVSS Base Score: 4.3 **CVSS Temporal Score:**See https://exchange.xforce.ibmcloud.com/vulnerabilities/97013 for the current score *CVSS Environmental Score:**Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Affected Products and Versions

WTX Secure Adapters Collection 8.4.1.0 - 8.4.1.2

WTX Secure Adapters Collection 8.4.0.0 - 8.4.0.5

WTX Secure Adapters Collection 8.3.0.0 - 8.3.0.6

WTX Secure Adapters Collection 8.2.0.0 - 8.2.0.6

WTX Secure Adapters Collection 8.1.0.0 - 8.1.0.5

Remediation/Fixes

Download and install the interim fix for APAR PI29359 from IBM Fix Central:
http://www.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/WebSphere+Transformation+Extender&release=All&platform=All&function=aparId&apars=PI29359

For releases running HP-UX on PA-RISC, contact IBM Support to request the fix.

IBM recommends that you review your entire environment to identify areas that enable the SSLv3 protocol and take appropriate mitigation and remediation actions. The most immediate mitigation action that can be taken is disabling SSLv3.

Workarounds and Mitigations

None.