IBM Support

Security Bulletin: Multiple security vulnerabilities have been identified in GSKit shipped with IBM Rational ClearCase

Security Bulletin


Summary

Vulnerabilities have been addressed in the GSKit component of IBM Rational ClearCase.

Vulnerability Details

CVEID: CVE-2016-0702
DESCRIPTION:
OpenSSL could allow a local attacker to obtain sensitive information, caused by a side-channel attack against a system based on the Intel Sandy-Bridge microarchitecture. An attacker could exploit this vulnerability to recover RSA keys.
CVSS Base Score: 2.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/111144 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)


CVEID: CVE-2018-1447
DESCRIPTION:
The GSKit CMS KDB logic fails to salt the hash function resulting in weaker than expected protection of passwords. A weak password may be recovered. Note: After update the customer should change password to ensure the new password is stored more securely. Products should encourage customers to take this step as a high priority action.
CVSS Base Score: 5.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/139972 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID: CVE-2018-1427
DESCRIPTION:
IBM GSKit contains several environment variables that a local attacker could overflow and cause a denial of service.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/139072 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2017-3736
DESCRIPTION:
OpenSSL could allow a remote attacker to obtain sensitive information, caused by a carry propagation flaw in the x86_64 Montgomery squaring function bn_sqrx8x_internal(). An attacker with online access to an unpatched system could exploit this vulnerability to obtain information about the private key.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/134397 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID: CVE-2017-3732
DESCRIPTION:
OpenSSL could allow a remote attacker to obtain sensitive information, caused by a carry propagating bug in the x86_64 Montgomery squaring procedure. An attacker could exploit this vulnerability to obtain information about the private key.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/121313 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2016-0705
DESCRIPTION:
OpenSSL is vulnerable to a denial of service, caused by a double-free error when parsing DSA private keys. An attacker could exploit this vulnerability to corrupt memory and cause a denial of service.
CVSS Base Score: 3.7
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/111140 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

Affected Products and Versions

ClearCase Windows CMI/OSLC client

Status
8.0 through 8.0.0.21
8.0.1 through 8.0.1.16
9.0 through 9.0.0.6
9.0.1 through 9.0.1.2
Affected

CMI and OSLC integrations:
Windows clients only, of the indicated releases.
    The IBM GSKit is used if ClearCase on Windows platforms is configured to integrate with a change management system with communication over SSL (https). This applies to any integration using Change Management Interface (CMI), and to non-CMI based UCM-enabled CQ integration via OSLC. If your ClearCase deployment is not using these integrations, or not using SSL with the integrations, then your deployment is not affected by this portion of the vulnerability.

    The UCM-enabled CQ integration without using OSLC (SQUID) is not affected by this vulnerability.
CCRC WAN server release
Status
8.0 through 8.0.0.21
8.0.1 through 8.0.1.16
9.0 through 9.0.0.6
9.0.1 through 9.0.1.2
Affected

CCRC WAN Server:
All platforms of the indicated releases.

Remediation/Fixes

Note: After applying the fixes as noted below, please refer to this document http://publib.boulder.ibm.com/httpserv/ihsdiag/restash.html for information concerning password re-stashing. It is advised that you re-stash your password due to CVE-2018-1447 after you apply the fixes.

The solution is to upgrade to a newer fix pack or release of ClearCase, and to apply fixes for IBM HTTP Server (IHS).

CMI and OSLC integrations on Windows clients:
The solution is to install a newer, fixed version of the GSKit runtime component.

Affected Versions
Applying the fix
9.0.1 through 9.0.1.2
9.0 through 9.0.0.6
Install Rational ClearCase Fix Pack 3 (9.0.1.3) for 9.0.1
8.0.1 through 8.0.1.16
8.0 through 8.0.0.21
Install Rational ClearCase Fix Pack 17 (8.0.1.17) for 8.0.1
CCRC WAN Server:
Apply an IHS fix for the issue:
  1. Determine the IHS version used by your CCRC WAN server. Navigate to the IBM HTTP Server installation directory (typically /opt/ibm/HTTPServer or C:\Program Files (x86)\IBM\HTTPServer), then execute the script: bin/versionInfo.sh (UNIX) or bin\versionInfo.bat (Windows). The output includes a section "IBM HTTP Server for WebSphere Application Server". Make note of the version listed in this section.
  2. Review the following IHS security bulletin for the available fixes: Security Bulletin: Multiple vulnerabilities GSKit bundled with IBM HTTP Server. Note: there may be newer security fixes for IBM HTTP Server. Follow the link below (in the section "Get Notified about Future Security Bulletins") to subscribe to WebSphere product support alerts for additional security fixes.
  3. Apply the relevant fixes to your IBM HTTP Server installation used on your CCRC WAN server host. No ClearCase-specific steps are necessary.

For 7.0, 7.1, 8.0, and earlier releases, IBM recommends upgrading to a fixed, supported version/release/platform of the product.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Important Note

IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.

References

Off

Change History

30 April 2018: Original version published
21 May 2018: Updated Affected Products and Remediation/Fixes for an IHS fix and password re-stashing due to CVE-2018-1447

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SSSH27","label":"Rational ClearCase"},"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Component":"Integrations: IBM","Platform":[{"code":"PF033","label":"Windows"}],"Version":"9.0.1.2;9.0.1.1;9.0.1;9.0.0.6;9.0.0.5;9.0.0.4;9.0.0.3;9.0.0.2;9.0.0.1;9.0;8.0.1.9;8.0.1.8;8.0.1.7;8.0.1.6;8.0.1.5;8.0.1.4;8.0.1.3;8.0.1.2;8.0.1.16;8.0.1.15;8.0.1.14;8.0.1.13;8.0.1.12;8.0.1.11;8.0.1.10;8.0.1.1;8.0.1;8.0.0.9;8.0.0.8;8.0.0.7;8.0.0.6;8.0.0.5;8.0.0.4;8.0.0.3;8.0.0.21;8.0.0.20;8.0.0.2;8.0.0.19;8.0.0.18;8.0.0.17;8.0.0.16;8.0.0.15;8.0.0.14;8.0.0.13;8.0.0.12;8.0.0.11;8.0.0.10;8.0.0.1;8.0","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
10 July 2018

UID

swg22012827