Flashes (Alerts)
Abstract
Multiple security vulnerabilities in the TLS implementation of the Java Runtime Environment shipped with WebSphere eXtreme Scale might allow attackers access to sensitive data.
Content
VULNERABILITY DETAILS:
CVE-2013-0440 - Unspecified vulnerability in Java Runtime Environment allows remote attackers to affect availability via vectors related to JSSE.
CVSS Base Score: 5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/81799
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2013-0443 - Unspecified vulnerability in Java Runtime Environment allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.
CVSS Base Score: 4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/81801
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N)
CVE-2013-0169 - The TLS protocol does not properly consider timing side-channel attacks, which allows remote attackers to conduct distinguishing attacks and plain-text recovery attacks via statistical analysis of timing data for crafted packets, also known as the "Lucky Thirteen" issue.
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/81902
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)
AFFECTED PRODUCTS AND VERSIONS:
All levels of WebSphere eXtreme Scale through V8.6.0.1.
REMEDIATION:
If running WebSphere eXtreme Scale 7.1.1 or 8.5 with the Java Runtime Environment shipped with those versions of the product, apply one of the following interim fixes:
Product Release | Interim Fix |
WebSphere eXtreme Scale 7.1.1 | PM87563 |
WebSphere eXtreme Scale 8.5 | PM88607 |
If running WebSphere eXtreme Scale V8.6.0 or V8.6.0.1, upgrade to WebSphere eXtreme Scale V8.6.0.2 or later.
The WebSphere eXtreme Scale Client is used to communicate with the WebSphere DataPower XC10 Appliance, and the recommended fix level described here should be applied to the client when used with the appliance as well.
Information on obtaining the required software updates is available at this link: http://www-01.ibm.com/support/docview.wss?uid=swg27018991
If running WebSphere eXtreme Scale Client or server within a WebSphere Application Server process, apply a fix as described in the WebSphere Application Server security bulletin for these vulnerabilities:
http://www-01.ibm.com/support/docview.wss?uid=swg21627634
If running WebSphere eXtreme Scale Client or server using a Java Runtime Environment obtained separately, obtain a fix for that Java Runtime Environment from the Java vendor.
Workarounds:
None
Mitigations:
None
REFERENCES:
· Complete CVSS Guide
· On-line Calculator V2
· CVE-2013-0440
· CVE-2013-0443
· CVE-2013-0169
· https://exchange.xforce.ibmcloud.com/vulnerabilities/81799
· https://exchange.xforce.ibmcloud.com/vulnerabilities/81801
· https://exchange.xforce.ibmcloud.com/vulnerabilities/81902
· IBM Security Alerts
· http://www-01.ibm.com/support/docview.wss?uid=swg21627634
RELATED INFORMATION:
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
CHANGE HISTORY
xx-xx-xxxx Original Version Published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.
Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
Was this topic helpful?
Document Information
Modified date:
25 September 2022
UID
swg21644596