IBM Support

Security Bulletin: Multiple vulnerabilities in OpenSSL affect IBM Workload Scheduler

Security Bulletin


Summary

OpenSSL vulnerabilities were disclosed by the OpenSSL Project. OpenSSL is used by IBM Workload Manager. IBM Workload Manager has addressed the applicable CVEs

Vulnerability Details

CVEID: CVE-2017-3732
DESCRIPTION:
 OpenSSL could allow a remote attacker to obtain sensitive information, caused by a propagation error in the BN_mod_exp() function. An attacker could exploit this vulnerability to obtain information about the private key.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/121313 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2017-3735
DESCRIPTION:
 OpenSSL could allow a remote attacker to obtain sensitive information, caused by an error while parsing an IPAdressFamily extension in an X.509 certificate. An attacker could exploit this vulnerability to trigger an out-of-bounds read, resulting in an incorrect text display of the certificate.
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/131047 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)

Affected Products and Versions

TWS uses OpenSSL only for secure communication between internal processes.

For Tivoli Workload Scheduler Distributed, TWS nodes are impacted by OpenSSL security exposures only if the TWS workstation has been defined with “securitylevel” set to on or enabled or force.

These security exposures do not apply to the embedded WebSphere Application Server but only to programs installed under <TWS home>/bin.

Tivoli Workload Scheduler Distributed 8.6.0 FP04 and earlier


Tivoli Workload Scheduler Distributed 9.1.0 FP02 and earlier
Tivoli Workload Scheduler Distributed 9.2.0 FP02 and earlier
IBM Workload Scheduler Distributed 9.3.0 FP03 and earlier
IBM Workload Scheduler Distributed 9.4.0 FP01 and earlier

Remediation/Fixes

APAR IJ00716 has been opened to address the openssl vulnerabilities for Tivoli Workload Scheduler.

The following limited availability fixes for IJ00716 are available for download on FixCentral

8.6.0-TIV-TWS-FP0004-IJ00716
to be applied on top of Tivoli Workload Scheduler Distributed 8.6.0 FP04

9.1.0-TIV-TWS-FP0002-IJ00716
to be applied on top of Tivoli Workload Scheduler Distributed 9.1.0 FP02

9.2.0-TIV-TWS-FP0002-IJ00716
to be applied on top of Tivoli Workload Scheduler Distributed 9.2.0 FP02

9.3.0-TIV-TWS-FP0003-IJ00716
to be applied on top of Tivoli Workload Scheduler Distributed 9.3.0 FP03

9.4.0-TIV-TWS-FP0001-IJ00716
to be applied on top of Tivoli Workload Scheduler Distributed 9.4.0 FP01

For these affected releases IJ00716, supersedes IV85683, IV82641, IV71646, IV70763, IV66395, IV66398, IV62010, IV61392, IV75062, IV91052.

For Unsupported releases IBM recommends upgrading to a fixed, supported release of the product.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Change History

October 31st 2017: Original Version Published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SSGSPN","label":"IBM Workload Scheduler"},"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Component":"Not Applicable","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF010","label":"HP-UX"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"},{"code":"PF033","label":"Windows"}],"Version":"8.6;9.1;9.2;9.3;9.4","Edition":"All Editions","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
17 June 2018

UID

swg22010154