Security Bulletin
Summary
There are multiple vulnerabilities in IBM® Runtime Environment Java™ Technology Edition, Versions 5 and 6 that are used by IBM Rational ClearCase. These issues were disclosed as part of the IBM Java SDK updates in April 2015.
Vulnerability Details
CVEID: CVE-2015-0488
DESCRIPTION: An unspecified vulnerability related to the JSSE component could allow a remote attacker to cause a denial of service.
CVSS Base Score: 5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/102336 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVEID: CVE-2015-0478
DESCRIPTION: An unspecified vulnerability related to the JCE component could allow a remote attacker to obtain sensitive information.
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/102339 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVEID: CVE-2015-1916
DESCRIPTION: Server applications which use the IBM Java Secure Socket Extension provider to accept SSL/TLS connections are vulnerable to a denial of service attack due to an unspecified vulnerability.
CVSS Base Score: 5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/101995 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Affected Products and Versions
IBM Rational ClearCase, versions 7.1.0.x, 7.1.1.x, 7.1.2.x, 8.0.0.x, 8.0.1.x, in the following components:
- CCRC WAN server/CM Server component, when configured to use SSL
- ClearCase remote client: CCRC/CTE GUI, rcleartool, and CMAPI clients, when using SSL to access a CCRC WAN Server/CM Server
ClearCase version | Status |
8.0.1 through 8.0.1.8 | Affected |
8.0 through 8.0.0.15 | Affected |
7.1.2 through 7.1.2.18 | Affected |
7.1.0.x, 7.1.1.x (all versions and fix packs) | Affected |
Remediation/Fixes
The solution is to install a fix that includes an updated Java™ Virtual Machine with fixes for the issues, and to apply fixes for WebSphere Application Server (WAS).
CCRC Client fixes
- Apply a fix pack that includes an updated Java™ Virtual Machine.
- If you use CCRC as an extension offering installed into an Eclipse shell (one not provided as part of a ClearCase release), or you use rcleartool or CMAPI using a Java™ Virtual Machine not supplied by IBM as part of Rational ClearCase, you should update the Java™ Virtual Machine you use to include a fix for the above issues. Contact the supplier of your Java™ Virtual Machine and/or the supplier of your Eclipse shell.
Affected Versions | Applying the fix |
8.0.1 through 8.0.1.8 | Install Rational ClearCase Fix Pack 9 (8.0.1.9) for 8.0.1 |
8.0 through 8.0.0.15 | Install Rational ClearCase Fix Pack 16 (8.0.0.16) for 8.0 |
7.1.2 through 7.1.2.18 7.1.0.x, 7.1.1.x (all versions and fix packs) | Customers on extended support contracts should install Rational ClearCase Fix Pack 19 (7.1.2.19) for 7.1.2 |
Notes:
Review the following WAS security bulletin:
Security Bulletin: Multiple vulnerabilities in IBM® Java SDK affect WebSphere Application Server April 2015 CPU
and apply the relevant fixes to your WAS installation and WAS profiles used for ClearCase.
Affected Versions | Applying the fix |
7.1.0.x, 7.1.1.x, and 7.1.2.x | Document 1390803 explains how to update WebSphere Application Server for ClearCase CM Servers at release 7.1.x. Consult those instructions when applying the fix. |
8.0.0.x 8.0.1.x | Apply the appropriate WebSphere Application Server fix directly to your CCRC WAN server host. No ClearCase-specific steps are necessary. |
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
Important Note
IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.
References
Acknowledgement
CVE-2015-1916 was reported to IBM by Karthikeyan Bhargavan of the PROSECCO team at INRIA
Change History
* 31 July 2015: Originally published
* 16 September 2015: Revised to refer to new fix pack
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Internal Use Only
Fixes will be part of the Test Fix for Logjam, and then rolled into future patch release (2015C).
Test fixes that have the updated JRE:
7.1.2.18 test fix 1
8.0.0.15 test fix 1
8.0.1.8 test fix 1
once we have patches, move this table into the main document:
Affected Versions | Applying the fix |
8.0.1.x | Install Rational ClearCase Fix Pack 9 XXX fix hlink (8.0.1.9) for 8.0.1 |
8.0.0.x | Install Rational ClearCase Fix Pack 16 XXX fix hlink (8.0.0.16) for 8.0 |
7.1.2.x 7.1.1.x 7.1.0.x | Customers on extended support contracts should install Rational ClearCase Fix Pack 19 XXX fix hlink (7.1.2.19) for 7.1.2 |
Was this topic helpful?
Document Information
Modified date:
10 July 2018
UID
swg21902824