Lucene search

K
ibmIBME121C7A373A623FA01F8270E29E312ADE46003066CF805E43468AC6EA9092162
HistoryJun 16, 2018 - 7:37 p.m.

Security Bulletin: IBM WebSphere Transformation Extender Secure Adapter Collection 8.4.1.1 CPU utilization and insecure Elliptic Curve Digital Signature Algorithm (CVE-2014-0963, CVE-2014-0076)

2018-06-1619:37:17
www.ibm.com
32

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

Summary

IBM WebSphere Transformation Extender Secure Adapter Collection product is affected by two issues: one related to the TLS implementation which, under very specific conditions, can cause CPU utilization to rapidly increase, the other related to an insecure Elliptic Curve Digital Signature Algorithm.

Vulnerability Details

CVE ID: CVE-2014-0963 **Description: **Multiple IBM products are affected by a problem with the handling of certain SSL messages. The TLS implementation can, under very specific conditions, cause CPU utilization to rapidly increase. The situation occurs only in a certain error case that causes a single thread to begin looping. If this happens multiple times, more threads will begin to loop and an increase in CPU utilization will be seen. This increase could ultimately result in CPU exhaustion and unresponsiveness of the products and other software running on the affected system. **CVSS Base Score:**7.1 **CVSS Temporal Score:**See https://exchange.xforce.ibmcloud.com/vulnerabilities/92844 for the current score *CVSS Environmental Score:**Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:C)

Workarounds and Mitigations:

Method One) Monitor CPU utilization of IBM WebSphere Transformation Extender Launcher Agent instances. If utilization becomes abnormally high, stop and restart the affected instance.

**Method Two)******Configure WTX Launcher Agent to use the legacy security protocol, which does not use GSKit. To do this, perform the following for every WTX instance in your environment:
1. Rename m4gskssl.dll or m4gskssl.so to a different extension (e.g. .dll_disable for windows, .so_disable for UNIX). The older security protocol stack, as implemented by mercssl.dll or mercssl.so, will then be automatically used.
2. In the [SSL_SERVER] section of the dtx.ini configuration file, set
secure_mode=0
If secure_mode is set to a value other than zero, then WTX will fail all secure communications, since mercssl module does not implement NIST compliance.


CVE ID:CVE-2014-0076
Description: OpenSSL could allow a local attacker to obtain sensitive information, caused by an implementation error in ECDSA (Elliptic Curve Digital Signature Algorithm). An attacker could exploit this vulnerability using the FLUSH+RELOAD cache side-channel attack to recover ECDSA nonces. **CVSS Base Score:**2.1 **CVSS Temporal Score:**See <https://exchange.xforce.ibmcloud.com/vulnerabilities/91990&gt;[](&lt;https://exchange.xforce.ibmcloud.com/vulnerabilities/92844&gt;) for the current score *CVSS Environmental Score:**Undefined CVSS Vector:(AV:L/AC:L/Au:N/C:P/I:N/A:N) **Workarounds and Mitigations: **None.

Affected Products and Versions

IBM WebSphere Transformation Extender Secure Adapter Collection 8.4.1.1

Remediation/Fixes

Download and install IBM WebSphere Transformation Extender Secure Adapter Collection 8.4.1.2 from <http://www.ibm.com/software/howtobuy/passportadvantage&gt;

CPENameOperatorVersion
ibm transformation extendereq8.4.1.1

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C