IBM Support

Security Bulletin: Vulnerability in Rational Functional Tester versions 8.5.1.1 and earlier due to security vulnerability in IBM SDK, Java Technology Edition Version 7 Service Refresh 6 (CVE-2013-5907, CVE-2014-0417)

Security Bulletin


Summary

A security vulnerability exists in IBM SDK, Java Technology Edition Version 7 Service Refresh 6 that can affect the security of Rational Functional Tester (RFT).

Vulnerability Details

Subscribe to My Notifications to be notified of important product support alerts like this.
  • Follow this link for more information (requires login with your IBM ID)


CVEID: CVE-2013-5907

Description: Remote attackers affect confidentiality, integrity, and availability via unknown vectors related to 2D.

CVSS Base Score: 10
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/90324 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVEID: CVE-2014-0417

Description: Remote attackers affect confidentiality, integrity, and availability via unknown vectors related to 2D.

CVSS Base Score: 9.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/90331 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)

Affected Products and Versions

Rational Functional Tester versions 8.5.1.1 and earlier that shipped with any of the following versions of Java are affected by the above-mentioned CVE IDs:

  • IBM SDK, Java Technology Edition Version 7 Service Refresh 6 and earlier
  • IBM SDK, Java Technology Edition Version 6 Service Refresh 15 and earlier
  • IBM SDK, Java Technology Edition Version 6.0.1 Service Refresh 7 and earlier

This includes, but is not limited to the following existing releases of Rational Functional Tester:
  • RFT 8.0.x and all fixpacks
  • RFT 8.1.x and all fixpacks
  • RFT 8.2.x and all fixpacks
  • RFT 8.3.x and all fixpacks
  • RFT 8.5.x and fixpacks till 8.5.1.1 (inclusive)

Remediation/Fixes

Rational Functional Tester version 8.0 to 8.2.x:

Rational Functional Tester version 8.3 or later:

Workarounds and Mitigations

If you do not want to upgrade to Rational Functional Tester 8.5.1.x, configure the existing installation of Rational Functional Tester to use IBM SDK, Java Technology Edition Version 7 Service Refresh 6 Fix Pack 1 which addresses the vulnerability.

Note: Java Runtimes from IBM are available only through the product installation.

Perform the following steps to download the latest Java that fixes this issue.

  1. Download Rational Functional Tester 8.5.1.x from FixCentral and install on an unused system.

  2. Navigate to the jdk folder within the 8.5.1.x installation of Rational Functional Tester (the folder is usually present at <RFT_Installation_Directory>/jdk).

    Copy this folder to the systems in which the previous versions of Rational Functional Tester are installed.

  3. Configure the installation of the previous versions of Rational Functional Tester to point to the Java copied in Step 2 as follows:
    1. From the <RFT_Installation_Directory>, open eclipse.ini.

      By default, the value passed to the -vm argument in eclipse.ini points to Java that is shipped with RFT.

      For example: -vm C:\Program Files (x86)\IBM\SDP\jdk\jre\bin\javaw.exe

    2. Modify the path of javaw.exe to point to IBM SDK, Java Technology Edition Version 7 Service Refresh 6 Fix Pack 1 that you copied in Step 2.

Note: If you are using any of the following version of Rational Functional Tester which shipped with IBM SDK, Java Technology Edition Version 6 Service Refresh, you can upgrade to IBM SDK, Java Technology Edition Version 7 Service Refresh 6 Fix Pack 1:
  • RFT 8.0.x and all fixpacks
  • RFT 8.1.x and all fixpacks
  • RFT 8.2.x and all fixpacks

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

None

Change History

* 28 February 2014: Original copy published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SSJMXE","label":"IBM Rational Functional Tester"},"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Component":"General Information","Platform":[{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"}],"Version":"8.0;8.0.0.1;8.0.0.2;8.0.0.3;8.0.0.4;8.1;8.1.0.1;8.1.0.2;8.1.0.3;8.1.1;8.1.1.1;8.1.1.2;8.1.1.3;8.2;8.2.0.1;8.2.0.2;8.2.1;8.2.1.1;8.2.2;8.2.2.1;8.3;8.3.0.1;8.3.0.2;8.5;8.5.0.1;8.5.1;8.5.1.1;8.5.1.2;8.5.1.3","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
07 May 2019

UID

swg21664796