Lucene search

K
ibmIBMDADA510BF07E9FAD7EFA94FD2CF38C074EA71DAF258A27D0B9A84DDBB8CED5F8
HistoryMay 01, 2020 - 7:21 a.m.

Security Bulletin: Vulnerabilities in libcurl and cURL affect Rational DOORS

2020-05-0107:21:03
www.ibm.com
27

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

Summary

Vulnerabilities in libcurl and cURL affect Rational DOORS.

Vulnerability Details

CVEID: CVE-2016-8616**
DESCRIPTION:** cURL/libcurl could allow a remote attacker to bypass security restrictions, caused by the use of case insensitive comparisons. By using valid credentials exists for a protocol which supports connection-scoped credentials, an attacker could exploit this vulnerability to cause a connection to be reused.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/118633 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVEID: CVE-2016-8621**
DESCRIPTION:** cURL/libcurl could allow a remote attacker to obtain sensitive information, caused by an out of bounds read error within the curl_getdate function. By using specially-crafted date strings, a remote attacker could exploit this vulnerability to execute arbitrary code in the context of the process and obtain sensitive information.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/118639 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2016-8624**
DESCRIPTION:** cURL/libcurl could allow a remote attacker to bypass security restrictions, caused by the failure to parse the authority component of the URL when handling ‘#’ character. By using a specially-crafted URL with ‘#’ character, an attacker could exploit this vulnerability to bypass access restrictions.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/118642 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVEID: CVE-2016-8625**
DESCRIPTION:** cURL/libcurl could provide weaker than expected security, caused by the translation of International Domain Names (IDNA) to puny code for DNS resolving using the IDNA 2003 standard. An attacker could exploit this vulnerability to issue network transfer requests to the wrong host.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/118644 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

Affected Products and Versions

Rational DOORS: 9.4.0.0 - 9.4.0.6, 9.5.0.0 - 9.5.0.6, 9.5.1.0 - 9.5.1.7, 9.5.2.0 - 9.5.2.6, 9.6.0.0 - 9.6.0.5, 9.6.1.0 - 9.6.1.7

The following Rational DOORS components are affected:

  • Rational DOORS desktop client
  • Rational DOORS database server
  • Rational DOORS interoperation server

Remediation/Fixes

Upgrade to the fix pack that corresponds to the version of Rational DOORS that you are running, as shown in the following table. Upgrade the Rational DOORS client, the Rational DOORS database server, and the Rational DOORS interoperation server.

NOTE: You should verify applying this fix does not cause any compatibility issues.

Rational DOORS version Upgrade to fix pack
9.4
9.4.0.1 - 9.4.0.6 9.4.0.7
9.5
9.5.0.1 - 9.5.0.6 9.5.0.7
9.5.1
9.5.1.1 - 9.5.1.7 9.5.1.8
9.5.2
9.5.2.1 - 9.5.2.6 9.5.2.7
9.6.0
9.6.0.1 - 9.6.0.5 9.6.0.6
9.6.1
9.6.1.1 - 9.6.1.7 9.6.1.8

For_ Rational DOORS version 9.3.x and earlier, IBM recommends upgrading to a fixed, supported version/release/platform of the product._

If you are using Rational DOORS Web Access, after you upgrade, but before you start the Rational DOORS Web Access server, edit the core configuration file and set the required version of the interoperation server to the version of the fix pack upgrade, as described in the following steps.

Procedure:

  1. To edit the Rational DOORS Web Access core configuration file, open the festival.xml file, which is in the server\festival\config directory.

  2. Add the following line in the <f:properties> section:

`<**f:property name="interop.version" value="9.n.n.n"** />

Replace "9.n.n.n`" with the version of the fix pack upgrade: 9.4.0.7, 9.5.0.7, 9.5.1.8, 9.5.2.7, 9.6.0.6, or 9.6.1.8.

  1. Save and close the file.

After this revision, only the specified version of the interoperation server can access the Rational DOORS database.

Workarounds and Mitigations

None

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N