IBM Support

Security Bulletin: Multiple Security Issues in IBM Tealeaf Customer Experience on Cloud Network Capture Add-On

Security Bulletin


Summary

BlueZ is vulnerable to a denial of service, caused by a buffer over-read issue. By using a specially-crafted dump file, an attacker could exploit this vulnerability to cause the application to crash.
IBM Tealeaf contains hard-coded credentials. A remote attacker could exploit this vulnerability to gain access to the system.
IBM Tealeaf Customer Experience could allow a remote attacker under unusual circumstances to read operational data or TLS session state for any active sessions, cause denial of service, or bypass security. 

Vulnerability Details


CVEID: CVE-2016-10161
DESCRIPTION:
 BlueZ is vulnerable to a denial of service, caused by a buffer over-read issue in object_common1 function in ext/standard/var_unserializer.c. By using a specially-crafted dump file, an attacker could exploit this vulnerability to cause the application to crash.
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/121892 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)

CVEID: CVE-2017-1204
DESCRIPTION:
 IBM Tealeaf contains hard-coded credentials. A remote attacker could exploit this vulnerability to gain access to the system.
CVSS Base Score: 5.6
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/123740 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)

CVEID: CVE-2016-2983
DESCRIPTION:
 IBM Tealeaf Customer Experience could allow a remote attacker under unusual circumstances to read operational data or TLS session state for any active sessions, cause denial of service, or bypass security. 
CVSS Base Score: 5.6
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/113999 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)


Affected Products and Versions

IBM Tealeaf Customer Experience on Cloud Network Capture Add-On 16.1.01.

Remediation/Fixes

Product

VRMF
Remediation/First Fix
IBM Tealeaf Customer Experience on Cloud Network Capture Add-On
16.1.01
https://tealeaf.support.ibmcloud.com/ics/support/DLList.asp?task=download&folderID=121267

Workarounds and Mitigations

Access to local networks containing networked Tealeaf servers should be limited to avoid unauthorized access to or disruption of Tealeaf services.
Access to PCA systems should be limited as much as possible.

Get Notified about Future Security Bulletins

References

Off

Change History

17 November 2017 - Initial Version.

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Internal Use Only


Security Bulletin History

92105
Submitted for review by SWATHI PRABHU (prabhusw@us.ibm.com) at 15:20:29 on 07/24/2017. Security Bulletin Reviewer reviewed as more information needed with comments 'Please include the version number(s) in the Affected Products and Versions and Remediation/Fixes sections.' by Anthony J. Gackle (tgackle@us.ibm.com) at 16:18:04 EST on 07/24/2017. Modified and submitted for review by SWATHI PRABHU (prabhusw@us.ibm.com) at 16:46:30 on 07/24/2017. Security Bulletin Reviewer review completed with comments 'Review complete - Security bulletin for PR# 92105' by Anthony J. Gackle (tgackle@us.ibm.com) at 09:20:18 EST on 07/25/2017. Security Bulletin Review by Reviewing Attorney bypassed by deadmin (deadmin) at 09:20:19 EST on 07/25/2017. Security Bulletin Reviews Complete by deadmin (deadmin) at 09:20:20 EST on 07/25/2017.

67239
Submitted for review by SWATHI PRABHU (prabhusw@us.ibm.com) at 15:17:39 on 07/24/2017. Security Bulletin Reviewer reviewed as more information needed with comments 'Please include the version number(s) in the Affected Products and Versions and Remediation/Fixes sections.' by Anthony J. Gackle (tgackle@us.ibm.com) at 16:15:02 EST on 07/24/2017. Modified and submitted for review by SWATHI PRABHU (prabhusw@us.ibm.com) at 16:45:42 on 07/24/2017. Security Bulletin Reviewer review completed with comments 'Review complete - Security bulletin for PR# 67239' by Anthony J. Gackle (tgackle@us.ibm.com) at 09:01:09 EST on 07/25/2017. Security Bulletin Review by Reviewing Attorney bypassed by deadmin (deadmin) at 09:01:11 EST on 07/25/2017. Security Bulletin Reviews Complete by deadmin (deadmin) at 09:01:12 EST on 07/25/2017.

77516
Submitted for review by SWATHI PRABHU (prabhusw@us.ibm.com) at 14:25:20 on 03/15/2017. Security Bulletin Reviewer reviewed as more information needed with comments 'Please adjust the spacing of the CVE's in the Vulnerability Details section. Also, since there is a version listed in the Affected Products and Versions section, please also fill it in in the Software version of the Document Information to the right.' by Anthony J. Gackle (tgackle@us.ibm.com) at 16:31:46 EST on 03/15/2017. Security Bulletin Reviewer reviewed as more information needed with comments 'The spacing of the CVE's in the Vulnerability Details section is still inconsistent. also, the Add-on lists as version 16.1.01 which does not match Version Independent in the Software version of the Document Information.' by Anthony J. Gackle (tgackle@us.ibm.com) at 14:35:20 EST on 03/22/2017. Security Bulletin Reviewer review completed with comments 'Review complete - Author chose not to change the Version Independent in the Software Version.' by Anthony J. Gackle (tgackle@us.ibm.com) at 14:29:34 EST on 06/08/2017. Security Bulletin Review by Reviewing Attorney bypassed by deadmin (deadmin) at 14:29:36 EST on 06/08/2017. Security Bulletin Reviews Complete by deadmin (deadmin) at 14:29:37 EST on 06/08/2017. Modified and submitted for review by SWATHI PRABHU (prabhusw@us.ibm.com) at 15:19:21 on 07/24/2017. Security Bulletin Reviewer reviewed as more information needed with comments 'Please include the version number(s) in the Affected Products and Versions and Remediation/Fixes sections. Comments by Anthony J. Gackle (tgackle@us.ibm.com) on Wed Mar 22 2017 14:35:20 GMT-0400 (EDT): The spacing of the CVE's in the Vulnerability Details section is still inconsistent. also, the Add-on lists as version 16.1.01 which does not match Version Independent in the Software version of the Document Information. Comments by Anthony J. Gackle (tgackle@us.ibm.com) on Wed Mar 15 2017 16:31:46 GMT-0400 (EDT): Please adjust the spacing of the CVE's in the Vulnerability Details section. Also, since there is a version listed in the Affected Products and Versions section, please also fill it in in the Software version of the Document Information to the right.' by Anthony J. Gackle (tgackle@us.ibm.com) at 16:16:39 EST on 07/24/2017. Modified and submitted for review by SWATHI PRABHU (prabhusw@us.ibm.com) at 16:44:03 on 07/24/2017. Security Bulletin Reviewer review completed with comments 'Review complete - Security bulletin for PR# 77516 Comments by Anthony J. Gackle (tgackle@us.ibm.com) on Thu Jun 08 2017 14:29:34 GMT-0400 (EDT): Review complete - Author chose not to change the Version Independent in the Software Version.' by Anthony J. Gackle (tgackle@us.ibm.com) at 09:15:25 EST on 07/25/2017. Security Bulletin Review by Reviewing Attorney bypassed by deadmin (deadmin) at 09:15:27 EST on 07/25/2017. Security Bulletin Reviews Complete by deadmin (deadmin) at 09:15:28 EST on 07/25/2017.

[{"Product":{"code":"SSERNK","label":"Tealeaf Customer Experience"},"Business Unit":{"code":"BU055","label":"Cognitive Applications"},"Component":"--","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"Version Independent","Edition":"","Line of Business":{"code":"","label":""}}]

Document Information

Modified date:
16 June 2018

UID

swg22006455