Lucene search

K
ibmIBMFA2F2201782B1543085C54AF885559335008FF5E107BC8B64162CFD984471A77
HistoryJun 17, 2018 - 1:04 p.m.

Security Bulletin: Vulnerability in RC4 stream cipher affects Watson Explorer, Watson Content Analytics, and OmniFind Enterprise Edition (CVE-2015-2808)

2018-06-1713:04:51
www.ibm.com
4

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

Summary

The RC4 “Bar Mitzvah” attack for SSL/TLS affects Watson Explorer, Watson Content Analytics, and OmniFind Enterprise Edition.

Vulnerability Details

CVEID: CVE-2015-2808 DESCRIPTION: The RC4 algorithm, as used in the TLS protocol and SSL protocol, could allow a remote attacker to obtain sensitive information. An attacker could exploit this vulnerability to remotely expose account credentials without requiring an active man-in-the-middle session. Successful exploitation could allow an attacker to retrieve credit card data or other sensitive information. This vulnerability is commonly referred to as “Bar Mitzvah Attack”.

CVSS Base Score: 5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/101851 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Affected Products and Versions

CVE-2015-2808 applies to the following products and versions:

  • Watson Explorer Foundational Components version 10.0.0.2 and earlier, version 9.0.0.6 and earlier, and version 8.2-4 and earlier
  • Watson Explorer Annotation Administration Console version 10.0.0.2 and earlier
  • Watson Explorer Analytical Components version 10.0.0.2 and earlier
  • Watson Content Analytics version 3.5.0.2 and earlier, version 3.0.0.5 and earlier, version 2.2.0.3 and earlier, and version 2.1.0.2 and earlier
  • OmniFind Enterprise Edition version 9.1.0.5 and earlier

Remediation/Fixes

Follow these steps to upgrade to the required version of IBM® Runtime Environment Java™ Technology Edition.

The table reflects product names at the time the specified versions were released. To use the links to Fix Central in this table, you must first log in to the IBM Support: Fix Central site at <http://www.ibm.com/support/fixcentral/&gt;.

Affected Product Affected Versions Required IBM Java Runtime How to acquire and apply the fix
IBM Watson Explorer Foundational Components 10.0 through 10.0.0.2 JVM 7.0 SR9 or later
  1. If not already installed, install V10.0 Fix Pack 2 (see the Fix Pack download document).
    If you upgrade to Version 10.0.0.2 after you update IBM Java Runtime, your changes are lost and you must repeat the steps.

  2. Download the IBM Java Runtime, Version 7 package for your edition (Standard, Enterprise, or Advanced) and operating system from Fix Central: interim fix 10.0.0.2-WS-WatsonExplorer-<Edition>Foundational-<OS>-7SR9 or later (for example, 10.0.0.2-WS-WatsonExplorer-EEFoundational-Linux-7SR9).

  3. To apply the fix, follow the steps in Updating IBM Java Runtime.
    IBM Watson Explorer| 9.0 through 9.0.0.6| JVM 7.0 SR9 or later|

  4. If not already installed, install V9.0 Fix Pack 6 (see Fix Central to download V9.0.0.6 Standard Edition or Enterprise Edition).
    If you upgrade to Version 9.0.0.6 after you update IBM Java Runtime, your changes are lost and you must repeat the steps.

  5. Download the IBM Java Runtime, Version 7 package for your edition and operating system from Fix Central: interim fix 9.0.0.5-WS-DataExplorer-<Edition>-<OS>-7SR9 or later (for example, 9.0.0.5-WS-DataExplorer-EE-Linux-7SR9).

  6. To apply the fix, follow the steps in Updating IBM Java Runtime.
    IBM InfoSphere Data Explorer| 8.2 through 8.2-4| JVM 7.0 SR9 or later|

  7. If not already installed, install V8.2 Fix Pack 4 (see Fix Central to download V8.2-4).
    If you upgrade to Version 8.2.4.0 after you update IBM Java Runtime, your changes are lost and you must repeat the steps.

  8. Download the IBM Java Runtime, Version 7 package for your operating system from Fix Central: interim fix 8.2-3-WS-DataExplorer-<OS>-7SR9 or later (for example, 8.2-3-WS-DataExplorer-Windows-7SR9).

  9. To apply the fix, follow the steps in Updating IBM Java Runtime.
    IBM Watson Explorer Foundational Components Annotation Administration Console| 10.0 through 10.0.0.2| JVM 7.0 SR9 or later|

  10. If not already installed, install V10.0 Fix Pack 2 (see the Fix Pack download document).
    If you upgrade to Version 10.0.0.2 after you update IBM Java Runtime, your changes are lost and you must repeat the steps.

  11. Download the 32-bit and 64-bit packages of IBM Java Runtime, Version 7 for IBM Watson Explorer Advanced Edition and your operating system from Fix Central: interim fix 10.0.0.2-WS-WatsonExplorer-AEAnalytical-<OS>[32]-7SR9or later (for example, 10.0.0.2-WS-WatsonExplorer-AEAnalytical-Linux32-7SR9 and 10.0.0.2-WS-WatsonExplorer-AEAnalytical-Linux-7SR9).

  12. To apply the fix, follow the steps in Updating IBM Java Runtime.
    IBM Watson Explorer Analytical Components| 10.0 through 10.0.0.2| JVM 7.0 SR9 or later|

  13. If not already installed, install V10.0 Fix Pack 2 (see the Fix Pack download document).
    If you upgrade to Version 10.0.0.2 after you configure IBM Java Runtime, your changes are lost and you must repeat the steps.

  14. Download the 32-bit (or 31-bit, if you use Linux on System z) and 64-bit packages of IBM Java Runtime, Version 7 for IBM Watson Explorer Advanced Edition and your operating system from Fix Central: interim fix 10.0.0.2-WS-WatsonExplorer-AEAnalytical-<OS>[32|31]-7SR9 or later (for example, 10.0.0.2-WS-WatsonExplorer-AEAnalytical-Linux32-7SR9 and 10.0.0.2-WS-WatsonExplorer-AEAnalytical-Linux-7SR9).

  15. To apply the fix, follow the steps in Updating IBM Java Runtime.

  16. If you use WebSphere Application Server instead of the embedded web application server, follow the instructions in the security bulletin, Vulnerability in RC4 stream cipher affects WebSphere Application Server.
    IBM Watson Content Analytics| 3.5 through 3.5.0.2| JVM 7.0 SR9 or later|

  17. If not already installed, install V3.5 Fix Pack 2 (see the Fix Pack download document).
    If you upgrade to Version 3.5.0.2 after you configure IBM Java Runtime, your changes are lost and you must repeat the steps.

  18. Download the 32-bit (or 31-bit, if you use Linux on System z) and 64-bit packages of IBM Java Runtime, Version 7 for your operating system from Fix Central: interim fix 3.5.0.2-WT-WCA-<OS>[32|31]-7SR9 or later (for example, 3.5.0.2-WT-WCA-AIX32-7SR9 and 3.5.0.2-WT-WCA-AIX-7SR9).

  19. To apply the fix, follow the steps in Updating IBM Java Runtime.

  20. If you use WebSphere Application Server instead of the embedded web application server, follow the instructions in the security bulletin, Vulnerability in RC4 stream cipher affects WebSphere Application Server.
    IBM Content Analytics with Enterprise Search| 3.0 through 3.0.0.5| JVM 6.0 SR16-FP4 or later|

  21. If not already installed, install V3.0 Fix Pack 5 (see the Fix Pack download document).
    If you upgrade to Version 3.0.0.5 after you update IBM Java Runtime, your changes are lost and you must repeat the steps.

  22. Download the 32-bit (or 31-bit, if you use Linux on System z) and 64-bit packages of IBM Java Runtime, Version 6 for your operating system from Fix Central: interim fix 3.0.0.5-WT-ICA-<OS>[32|31]-6SR16FP4 or later (for example, 3.0.0.5-WT-ICA-Linux32-6SR16FP4 and 3.0.0.5-WT-ICA-Linux-6SR16FP4).

  23. To apply the fix, follow the steps in Updating IBM Java Runtime.

  24. If you use WebSphere Application Server instead of the embedded web application server, follow the instructions in the security bulletin, Vulnerability in RC4 stream cipher affects WebSphere Application Server.
    IBM Content Analytics| 2.2 through 2.2.0.3| JVM 6.0 SR16-FP4 or later|

  25. If not already installed, install V2.2 Fix Pack 3 (see the Fix Pack download document).
    If you upgrade to Version 2.2.0.3 after you update IBM Java Runtime, your changes are lost and you must repeat the steps.

  26. Download the 32-bit (or 31-bit, if you use Linux on System z) and 64-bit packages of IBM Java Runtime, Version 6 for your operating system from Fix Central: interim fix 2.2.0.3-WT-ICA-<OS>[32|31]-6SR16FP4 or later (for example, 2.2.0.3-WT-ICA-AIX32-6SR16FP4 and 2.2.0.3-WT-ICA-AIX-6SR16FP4).

  27. To apply the fix, follow the steps in Updating IBM Java Runtime.

  28. If you use WebSphere Application Server instead of the embedded web application server, follow the instructions in the security bulletin, Vulnerability in RC4 stream cipher affects WebSphere Application Server.
    IBM Cognos Content Analytics| 2.1 through 2.1.0.2| JVM 6.0 SR16-FP4 or later|

  29. If not already installed, install V2.1 Fix Pack 2 (see the Fix Pack download document).
    If you upgrade to Version 2.1.0.2 after you update IBM Java Runtime, your changes are lost and you must repeat the steps.

  30. Download the 32-bit and 64-bit packages of IBM Java Runtime, Version 6 for your operating system from Fix Central: interim fix 2.1.0.2-WT-ICA-<OS>[32]-6SR16FP4 or later (for example, 2.1.0.2-WT-ICA-AIX32-6SR16FP4 and 2.1.0.2-WT-ICA-AIX-6SR16FP4).

  31. To apply the fix, follow the steps in Updating IBM Java Runtime.
    IBM OmniFind Enterprise Edition| 9.1 through 9.1.0.5| JVM 6.0 SR16-FP4 or later|

  32. If not already installed, install V9.1 Fix Pack 5 (see the Fix Pack download document).
    If you upgrade to Version 9.1.0.5 after you update IBM Java Runtime, your changes are lost and you must repeat the steps.

  33. Download the 32-bit (or 31-bit, if you use Linux on System z) and 64-bit packages of IBM Java Runtime, Version 6 for your operating system from Fix Central: interim fix 9.1.0.5-WT-OEE-<OS>[32|31]-6SR16FP4 or later (for example, 9.1.0.5-WT-OEE-Windows32-6SR16FP4 and 9.1.0.5-WT-OEE-Windows-6SR16FP4).

  34. To apply the fix, follow the steps in Updating IBM Java Runtime.

  35. If you use WebSphere Application Server instead of the embedded web application server, follow the instructions in the security bulletin, Vulnerability in RC4 stream cipher affects WebSphere Application Server.

**Note:**The IBM Java Runtime versions referenced in this security bulletin include the fixes for the vulnerabilities identified in Vulnerability in IBM Java Runtime (the “FREAK: Factoring attack on RSA-EXPORT keys").

Workarounds and Mitigations

None.

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

Related for FA2F2201782B1543085C54AF885559335008FF5E107BC8B64162CFD984471A77