IBM Support

Security Bulletin: TLS padding vulnerability affects IBM TXSeries for Multiplatforms (CVE-2014-8730)

Security Bulletin


Summary

Transport Layer Security (TLS) padding vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) like attack affects TXSeries for Multiplatforms.

Vulnerability Details

CVE-ID: CVE-2014-8730

DESCRIPTION:
Product could allow a remote attacker to obtain sensitive information, caused by the failure to check the contents of the padding bytes when using CBC cipher suites of some TLS implementations. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) like attack to decrypt sensitive information and calculate the plaintext of secure connections.

CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/99216 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Affected Products and Versions

TXSeries for Multiplatforms V7.1, V8.1

Remediation/Fixes

TXSeries for Multiplatforms V7.1:

AIX:
http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FWebSphere%2FTXSeries+for+Multiplatforms&fixids=7.1.0.5-TXSeries-AIX-IF011&source=SAR

HPUX:
http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FWebSphere%2FTXSeries+for+Multiplatforms&fixids=7.1.0.5-TXSeries-HPUX-IF012&source=SAR

HPIA:
http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FWebSphere%2FTXSeries+for+Multiplatforms&fixids=7.1.0.5-TXSeries-HPIA-IF10&source=SAR

Solaris:
http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FWebSphere%2FTXSeries+for+Multiplatforms&fixids=7.1.0.5-TXSeries-SunOS-IF013&source=SAR

Windows:
http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FWebSphere%2FTXSeries+for+Multiplatforms&fixids=7.1.0.5-TXSeries-Windows-IF014&source=SAR

TXSeries for Multiplatforms V8.1:

AIX:
http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FWebSphere%2FTXSeries+for+Multiplatforms&fixids=8.1.0.1-TXSeries-AIX-IF013&source=SAR

HPIA:
http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FWebSphere%2FTXSeries+for+Multiplatforms&fixids=8.1.0.1-TXSeries-HPIA-IF014&source=SAR

Solaris:
http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FWebSphere%2FTXSeries+for+Multiplatforms&fixids=8.1.0.1-TXSeries-SunOS-IF015&source=SAR

Windows:
http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FWebSphere%2FTXSeries+for+Multiplatforms&fixids=8.1.0.1-TXSeries-Windows-IF016&source=SAR

Linux:
http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FWebSphere%2FTXSeries+for+Multiplatforms&fixids=8.1.0.1-TXSeries-Linux-IF017&source=SAR

Workarounds and Mitigations

TXSeries for Multiplatforms provides an optional configurable capability to enable SSL for its IPIC communication protocol.

TXSeries for Multiplatforms V7.1

If you are on TXSeries for Multiplatforms V7.1, you need to upgrade to Fixpack 4 or higher. Lower fix pack levels do not address this TLS vulnerability.

1. Stop the TXSeries region.

2. If you have not configured your region to use GSKit version 8.x, set the below variable in the region’s environment file. CICS_GSKIT_VERSION=8

If your region is already configured with GSKit version 8.x then go to step 3.

(By Default TXSeries 7.1 support GSKit version 7.x. Refer to the TXSeries infocenter for further configuration details.)

3. Set the below environment variable in the region’s environment file.

GSK_STRICTCHECK_CBCPADBYTES=GSK_TRUE

4. Restart the TXSeries region.

TXSeries for Multiplatforms V8.1

1. Stop the TXSeries region.

2. Set the below environment variable in the regions environment file

GSK_STRICTCHECK_CBCPADBYTES=GSK_TRUE

3. Restart the TXSeries region.

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

None

Change History

23 December 2014: Original Version Published
23 December 2014: Title updated to include CVE
23 December 2014: Change history section inserted

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SSAL2T","label":"TXSeries for Multiplatforms"},"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Component":"--","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF010","label":"HP-UX"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"},{"code":"PF033","label":"Windows"}],"Version":"7.1;8.1","Edition":"","Line of Business":{"code":"LOB35","label":"Mainframe SW"}}]

Document Information

Modified date:
02 August 2018

UID

swg21693361