Lucene search

K
ibmIBME9B23188D4CCA6C1E321ACEC67191764E8ED4AB52354B35908181856B0241E2E
HistoryJul 10, 2018 - 8:34 a.m.

Security Bulletin: XML vulnerabilities in ClearCase (CVE-2016-0729, CVE-2016-4463)

2018-07-1008:34:12
www.ibm.com
8

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Summary

IBM Rational ClearCase is vulnerable to XML parsing attacks. These attacks could cause a denial of service or execution of code.

Vulnerability Details

CVEID: CVE-2016-0729**
DESCRIPTION:** Apache Xerces-C XML Parser library is vulnerable to a denial of service, caused by improper bounds checking during processing and error reporting. By sending specially crafted input documents, an attacker could exploit this vulnerability to cause the library to crash or possibly execute arbitrary code on the system.
CVSS Base Score: 7.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/111028 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

CVEID: CVE-2016-4463**
DESCRIPTION:** Apache Xerces-C XML Parser library is vulnerable to a denial of service, caused by a stack-based buffer overflow when parsing a deeply nested DTD. A remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/114596 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

Affected Products and Versions

ClearCase version

|

Status

—|—

9.0.1, 9.0.1.1

|

Not Affected

9.0 through 9.0.0.4

|

Affected

8.0.1 through 8.0.1.14

|

Affected

8.0 through 8.0.0.21

|

Affected

7.1.2 through 7.1.2.19 (all fix packs)

|

Affected

Remediation/Fixes

The solution is to upgrade to a newer fix pack or release of ClearCase.

Affected Versions

|

** Applying the fix**

—|—

9.0 through 9.0.0.4

| Install Rational ClearCase Fix Pack 5 (9.0.0.5) for 9.0 or Rational ClearCase release 9.0.1

8.0 through 8.0.0.21
8.0.1 through 8.0.1.14

| Install Rational ClearCase Fix Pack 15 (8.0.1.15) for 8.0.1

7.1.2 through 7.1.2.19 (all fix packs)

| Customers should upgrade to a fixed, supported version/release of the product.
For 7.0, 7.1, 7.1.1 and earlier releases, IBM recommends upgrading to a fixed, supported version/release/platform of the product.

Workarounds and Mitigations

None

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P