Lucene search

K
ibmIBMFEEC6406B761FE11953A237D6FF26E651E476C97DD8131AAF325021644AF8BFB
HistoryJun 16, 2018 - 7:49 p.m.

Security Bulletin: Vulnerabilities in the GSKit component of Transformation Extender (CVE-2016-0201, CVE-2015-7421, CVE-2015-7420)

2018-06-1619:49:59
www.ibm.com
5

EPSS

0.003

Percentile

69.4%

Summary

Vulnerabilities have been addressed in the GSKit component of Transformation Extender.

Vulnerability Details

CVEID: CVE-2016-0201 DESCRIPTION: IBM GSKit could allow a remote attacker to obtain sensitive information, caused by a MD5 collision. An attacker could exploit this vulnerability to obtain authentication credentials.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/109310 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

C****VEID: CVE-2015-7421 DESCRIPTION: A vulnerability in GSKit could allow a remote attacker to obtain sensitive information. The internal ICC PRNG pool state is duplicated during a fork() system call operation which results in a period of time where child processes may generate identical PRNG output to the parent. This may allow possible attacks related to predictable state which an attacker could exploit.
CVSS Base Score: 3.7
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/107695&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2015-7420 DESCRIPTION: A vulnerability in GSKit could allow a remote attacker to obtain sensitive information. The GSKit PRNG state is duplicated during a fork() system call operation which results in a period of time where child processes may generate identical PRNG output to the parent.
CVSS Base Score: 3.7
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/107694 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

Transformation Extender 9.0.0.0

WebSphere Transformation Extender Secure Adapter Collection 8.4.1.0 - 8.4.1.3

WebSphere Transformation Extender Secure Adapter Collection 8.4.0.0 - 8.4.0.5

WebSphere Transformation Extender Secure Adapter Collection 8.3.0.0 - 8.3.0.6

Remediation/Fixes

Download and install the fixes for APAR PI55562 from IBM Fix Central:

* [Interim fixes for version 9.0](&lt;http://www.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Other%2Bsoftware&product=ibm/Other+software/Transformation+Extender&release=9.0.0&platform=All&function=aparId&apars=PI55562&gt;)
* [Interim fixes for version 8.x](&lt;http://www.ibm.com/support/fixcentral/swg/selectFixes?product=ibm/WebSphere/WebSphere+Transformation+Extender&release=All&platform=All&function=aparId&apars=PI55562&gt;)

Workarounds and Mitigations

None

EPSS

0.003

Percentile

69.4%

Related for FEEC6406B761FE11953A237D6FF26E651E476C97DD8131AAF325021644AF8BFB