Lucene search

K
ibmIBME6153C35BD44471C95F1EFEED9B29C46E12A43C017CCADB1D87BD84154E4A620
HistoryJun 15, 2018 - 10:33 p.m.

Security Bulletin: Vulnerability in SSLv3 affects IBM Cognos Command Center (CVE-2014-3566)

2018-06-1522:33:59
www.ibm.com
28

3.4 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

Summary

SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled in IBM Cognos Command Center.

Vulnerability Details

CVE-ID: CVE-2014-3566

DESCRIPTION: Product could allow a remote attacker to obtain sensitive information, caused by a design error when using the SSLv3 protocol. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt SSL sessions and access the plaintext of encrypted connections.

CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/97013 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Affected Products and Versions

IBM Cognos Command Center 10.1, 10.2 and 10.2.0.1.

Remediation/Fixes

Remediation

The recommended solution is to apply the IBM JRE 6.0 SR16FP2 to the following versions of
IBM Cognos Command Center:

  • IBM Cognos Command Center 10.1
  • IBM Cognos Command Center 10.2
  • IBM Cognos Command Center 10.2.0.1

The fix for all affected versions is found here: IBM Fix Central for IBM Cognos Command Center

Installation instructions for applying the SSLv3 POODLE fix.

Part 1: For Windows servers where the Agent or Server component is installed.

  1. Download the 32 bit IBM Java JRE (file name: ibm-java-jre-60-win-i386.zip, Size: 75 MB).
  2. Stop the CccServer, CccQueue and CccAgent Windows services.
  3. Rename the <INSTALLDIR>\Common\java directory to <INSTALLDIR>\Common\java.orig
  4. Unpack the content of the ibm-java-jre-60-win-i386.zip file to <INSTALLDIR>\Common\java
  5. Start the CccAgent, CccQueue and CccServer Windows services.
  6. Validate the installation by testing the connectivity to the agent using the CCC Client.

Part 2: For Windows servers where any Commmand Center component is installed.

In addition to the steps described in part 1, please disable SSLv3 for the Windows servers running any IBM Cognos Command Center components. Please refer to Microsoft Security Advisory 300908 <https://technet.microsoft.com/en-us/library/security/3009008.aspx&gt;.

Part 3: For UNIX servers where the Agent component is installed

Please update your Java Runtime Environment to a version that contains a fix for the SSLv3 POODLE vulnerability and reconfigure the Agent installation to use this Java Runtime Environment.

Workarounds and Mitigations

Disable SSLv3 for the Windows servers running any IBM Cognos Command Center components. Please refer to Microsoft Security Advisory 300908 <https://technet.microsoft.com/en-us/library/security/3009008.aspx&gt;.

3.4 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N