Lucene search

K
ibmIBMEB67E51171F7C34A22B244E03166CB1F7D74162E476DCFA216B46A44310996E5
HistoryApr 08, 2021 - 8:59 p.m.

Security Bulletin: Vulnerability in SSLv3 affects InfoSphere BigInsights (CVE-2014-3566)

2021-04-0820:59:42
www.ibm.com
17

3.4 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

Summary

SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled in BigInsights.

Vulnerability Details

CVE-ID: CVE-2014-3566

DESCRIPTION: InfoSphere BigInsights could allow a remote attacker to obtain sensitive information, caused by a design error when using the SSLv3 protocol. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt SSL sessions and access the plain text of encrypted connections.

CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/97013 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Affected Products and Versions

IBM InfoSphere BigInsights: 2.0-3.0.0.1

Remediation/Fixes

For version 3.0, and 3.0.0.1: Upgrade to the fix pack version InfoSphere BigInsights 3.0.0.2.

Workarounds and Mitigations

For all affected versions of InfoSphere BigInsights, IBM recommends disabling SSLv3. The server SSL configuration should be modified to use SSL protocol TLS as shown below to disable SSLv3.

The following steps should be performed to disable SSLv3 and enable TLS:

  1. Login as a BigInsights admin user.
  2. Stop the console: $BIGINSIGHTS_HOME/bin/stop.sh console
  3. Update the console configuration file:
    1. Find ssl configuration element in $BIGINSIGHTS_HOME/console/wlp/usr/servers/waslp-server/server.xml.
    2. Add attribute** sslProtocol=“TLS”**.
    For example: <ssl clientAuthenticationSupported=“true” id=“defaultSSLSettings” keyStoreRef=“defaultKeyStore” sslProtocol=“TLS”/>
  4. Restart the console: $BIGINSIGHTS_HOME/bin/start.sh console

3.4 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N