Lucene search

K
ibmIBME9B9688AF49ED050872383DC96B25A14C9FE2F363B5DF782F81AC54022F4663B
HistoryJun 17, 2018 - 2:59 p.m.

Security Bulletin: Vulnerability in IBM WebSphere Application Server affects Tivoli Workload Scheduler (CVE-2015-0138)

2018-06-1714:59:34
www.ibm.com
9

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

Summary

The “FREAK: Factoring Attack on RSA-EXPORT keys" TLS/SSL client and server vulnerability affects IBM embedded WebSphere Application Server that is used by Tivoli Workload Scheduler.

Vulnerability Details

CVEID: CVE-2015-0138 DESCRIPTION: A vulnerability in various IBM SSL/TLS implementations could allow a remote attacker to downgrade the security of certain SSL/TLS connections. An IBM SSL/TLS client implementation could accept the use of an RSA temporary key in a non-export RSA key exchange ciphersuite. This could allow a remote attacker using man-in-the-middle techniques to facilitate brute-force decryption of TLS/SSL traffic between vulnerable clients and servers.

This vulnerability is also known as the FREAK attack.

CVSS Base Score: 4.3
CVSS Temporal Score: See http://exchange.xforce.ibmcloud.com/#/vulnerabilities/100691 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Affected Products and Versions

Tivoli Workload Scheduler is potentially impacted by the listed vulnerabilities since they potentially affect secure communications between eWAS and subcomponents through Java exposures.
The issues have been fixed updating Java inside eWAS installed with the latest fixpack version of TWS.

The affected versions are:
Tivoli Workload Scheduler Distributed 8.4.0
Tivoli Dynamic Workload Console 8.4.0
Tivoli Workload Scheduler Distributed 8.5.0
Tivoli Dynamic Workload Console 8.5.0
Tivoli Workload Scheduler z/OS Connector 8.5.0
Tivoli Workload Scheduler Distributed 8.5.1
Tivoli Dynamic Workload Console 8.5.1
Tivoli Workload Scheduler z/OS Connector 8.5.1
Tivoli Workload Scheduler Distributed 8.6.0
Tivoli Dynamic Workload Console 8.6.0
Tivoli Workload Scheduler z/OS Connector 8.6.0

For Tivoli Workload Scheduler Distributed 9.1 and 9.2 the only change needed is the one that refers to localopts.

Since TWS 9.1 and 9.2 did not include WebSphere Application Server refer to

http://www-01.ibm.com/support/docview.wss?uid=swg21698613 to patch this product.

Remediation/Fixes

IBM has provided patches for all affected versions. Follow the installation instructions in the README files included with the patch.

After patch has been installed, before restarting the product, it is necessary to perform the following step for Master Domain Managers, Backup Master Domain Manager and classic FTA (no changes for Dynamic Agent or zCentric):

Locate in the the localopts file the line

#CLI SSL chiper = MD5

and change it in

CLI SSL cipher = HIGH

(notice that original string “chiper” was incorrect so please change it to “cipher”)

Apar IV71618 has been opened for the issues.

For TWS 8.4.0, 8.5.0, 8.5.1 it is mandatory to install the Limited Availability fixes IV61280 and IV70762 before applying Limited Availability fix IV71618. For TWS 8.6.0, it is mandatory to install the Limited Availability fix IV70762 before applying IV71618.

The following interim fixes for IV71618 will be available for download on FixCentral:

8.4.0-TIV-TWS-FP0007- IV71618
to be applied on top of Tivoli Workload Scheduler Distributed 8.4.0 FP07

8.5.0-TIV-TWS-FP0005- IV71618
to be applied on top of Tivoli Workload Scheduler Distributed 8.5.0 FP05

8.5.1-TIV-TWS-FP0005- IV71618
to be applied on top of Tivoli Workload Scheduler Distributed 8.5.1 FP05

8.6.0-TIV-TWS-FP0003- IV71618
to be applied on top of Tivoli Workload Scheduler Distributed 8.6.0 FP03

and officially included in next fixpacks for the affected TWS versions.
Further information about WebSphere configuration and fix can be found here

http://www-01.ibm.com/support/docview.wss?uid=swg21698613

You should verify applying this fix does not cause any compatibility issues.
For unsupported releases IBM recommends upgrading to a fixed, supported version/release/platform of the product.

Workarounds and Mitigations

You should verify applying this configuration change does not cause any compatibility issues.

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

Related for E9B9688AF49ED050872383DC96B25A14C9FE2F363B5DF782F81AC54022F4663B