IBM Support

Heartbleed vulnerability in OpenSSL Cryptographic Software Library - IBM Servers

Troubleshooting


Problem

[This abstract has been truncated due to length constraints] OpenSSL could allow a remote attacker to obtain sensitive information, caused by an error in the TLS/DTLS heartbeat functionality. An attacker could exploit this vulnerability to expose 64 KBof private memory and retrieve secret keys. An attacker can repeatedly expose additional 64 KB chunks of memory. This vulnerability can be remotely exploited, authentication is not required, and the exploit is not complex. This vulnerability can be exploited on any system (that is: server, client, agent) receiving connections using the vulnerable OpenSSL library.

Resolving The Problem

Source

RETAIN tip: H182847

Symptom

OpenSSL could allow a remote attacker to obtain sensitive information, caused by an error in the TLS/DTLS heartbeat functionality. An attacker could exploit this vulnerability to expose 64 KB of private memory and retrieve secret keys. An attacker can repeatedly expose additional 64 KB chunks of memory. This vulnerability can be remotely exploited, authentication is not required, and the exploit is not complex. This vulnerability can be exploited on any system (that is: server, client, agent) receiving connections using the vulnerable OpenSSL library.

CVSS Base Score: 5.0
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/92322
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:N/A:N)

Warning: We strongly encourage you to take action as soon as possible as potential implications to your environment may be more serious than indicated by the CVSS score.

CVE-ID: CVE-2014-0076

OpenSSL could allow a local attacker to obtain sensitive information, caused by an implementation error in ECDSA (Elliptic Curve Digital Signature Algorithm). An attacker could exploit this vulnerability using the FLUSH+RELOAD cache side-channel attack to recover ECDSA nonces. This vulnerability can only be exploited locally, authentication is not required, and the exploit is not complex. An exploit can only partially affect confidentially, but not integrity or availability.

CVSS Base Score: 2.1
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/91990
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:N/A:N)

Affected configurations

The system can be any of the following IBM servers:

This tip is not software specific.

This tip is not option specific.

The following system BIOS/uEFI level(s) are affected:

System x3550 M4, Type 7914 Version 3.71, Build ID: 1AOO52W

Solution

This behavior was corrected in the Integrated Management Module (IMM) release in the following versions. If users have installation issues, contact the appropriate Support Center for the user's geography. In the United States, contact 1-800-IBM-SERV (1-800-426-7378).

The IBM Directory of Worldwide Contacts is available at the following URL:

http://www.ibm.com/planetwide/

  • System x3100 M4, Type 2582 Version 3.73, Build ID: 1AOO56D
  • System x3250 M5, Type 5458 Version 3.83, Build ID: 1AOO56I
  • System x3250 M4, Type 2583 Version 3.73, Build ID: 1AOO56D
  • System x3300 M4, Type 7382 Version 3.84, Build ID: 1AOO56J
  • System x3500 M4, Type 7383 Version 3.73, Build ID: 1AOO56D
  • System x3500 M4, Type 7383 E5-xxxxV2 Version 3.73, Build ID: 1AOO56D
  • System x3530 M4, Type 7160 Version 3.77, Build ID: 1AOO56H
  • System x3530 M4, Type 7160 E5-xxxxV2 Version 3.77, Build ID: 1AOO56H
  • System x3550 M4, Type 5459 Version 3.73, Build ID: 1AOO56D
  • System x3550 M4, Type 7914 Version 3.73, Build ID: 1AOO56D
  • System x3550 M4, Type 7914 E5-xxxxV2 Version 3.73, Build ID: 1AOO56D
  • System x3630 M4, Type 7158 Version 3.77, Build ID: 1AOO56H
  • System x3630 M4, Type 7158 E5-xxxxV2 Version 3.77, Build ID: 1AOO56H
  • System x3650 M4 BD, Type 5466 Version 3.75, Build ID: 1AOO56F
  • System x3650 M4 HD, Type 5460 Version 3.86, Build ID: 1AOO56L
  • System x3650 M4, Type 7915 Version 3.73, Build ID: 1AOO56D
  • System x3650 M4, Type 7915 E5-xxxxV2 Version 3.73, Build ID: 1AOO56D
  • iDataPlex dx360 M4 server, Type 7912 Version 3.73, Build ID: 1AOO56D
  • iDataPlex dx360 M4 server, Type 7912 E5-xxxxV2 Version 3.73, Build ID: 1AOO56D
  • NeXtScale nx360 M4, Type 5455 Version 3.85, Build ID: 1AOO56I

Additional information

The exposure is in the OpenSSL's implementation of the TLS/DTLS (transport layer security protocols) heartbeat extension (RFC6520). When this vulnerability is exploited, it leads to the leak of memory contents from the server to the client, and from the client to the server.

Encryption is used to protect secrets that may harm user's privacy or security if they are leaked. In order to coordinate recovery from this error, IBM has classified the compromised secrets to four categories:

  1. Primary key material
  2. Secondary key material
  3. Protected content
  4. Collateral

IBM PSIT team has published an IBM response at PSIRT blog. It includes list of products that are not affected by this issue.

  https://www.ibm.com/connections/blogs/PSIRT/entry/openssl_heartbleed_cve_2014_0160?lang=en_us
(where PSIRT = Product Security Incident Response Team)

Document Location

Worldwide

Operating System

System x:Operating system independent / None

Lenovo x86 servers:Operating system independent / None

[{"Type":"HW","Business Unit":{"code":"BU016","label":"Multiple Vendor Support"},"Product":{"code":"QU01DEW","label":"System x->System x3500 M4->7383"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Line of Business":{"code":"","label":""}},{"Type":"HW","Business Unit":{"code":"BU016","label":"Multiple Vendor Support"},"Product":{"code":"QU01DKP","label":"System x->System x3650 M4->7915"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Line of Business":{"code":"","label":""}},{"Type":"HW","Business Unit":{"code":"BU016","label":"Multiple Vendor Support"},"Product":{"code":"QU01FYU","label":"System x->System x3550 M4->5459"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Line of Business":{"code":"","label":""}},{"Type":"HW","Business Unit":{"code":"BU016","label":"Multiple Vendor Support"},"Product":{"code":"QU01GCQ","label":"System x->System x3530 M4->7160"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Line of Business":{"code":"","label":""}},{"Type":"HW","Business Unit":{"code":"BU016","label":"Multiple Vendor Support"},"Product":{"code":"QU90ACJ","label":"System x->System x3100 M4->2582"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Line of Business":{"code":"","label":""}},{"Type":"HW","Business Unit":{"code":"BU016","label":"Multiple Vendor Support"},"Product":{"code":"QU90ACK","label":"System x->System x3250 M4->2583"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Line of Business":{"code":"","label":""}},{"Type":"HW","Business Unit":{"code":"BU016","label":"Multiple Vendor Support"},"Product":{"code":"QU90ADC","label":"System x->System x iDataPlex dx360 M4 server->7912"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Line of Business":{"code":"","label":""}},{"Type":"HW","Business Unit":{"code":"BU016","label":"Multiple Vendor Support"},"Product":{"code":"QU91IPI","label":"System x->System x3550 M4->7914"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Line of Business":{"code":"","label":""}},{"Type":"HW","Business Unit":{"code":"BU016","label":"Multiple Vendor Support"},"Product":{"code":"QU91NCW","label":"System x->System x3630 M4->7158"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Line of Business":{"code":"","label":""}},{"Type":"HW","Business Unit":{"code":"BU016","label":"Multiple Vendor Support"},"Product":{"code":"QU91SVT","label":"System x->System x3300 M4->7382"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Line of Business":{"code":"","label":""}},{"Type":"HW","Business Unit":{"code":"BU016","label":"Multiple Vendor Support"},"Product":{"code":"QUOEJ2R","label":"System x->System x3650 M4 HD->5460"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Line of Business":{"code":"","label":""}},{"Type":"HW","Business Unit":{"code":"BU016","label":"Multiple Vendor Support"},"Product":{"code":"QUOEJE6","label":"System x->NeXtScale nx360 M4->5455"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Line of Business":{"code":"","label":""}},{"Type":"HW","Business Unit":{"code":"BU016","label":"Multiple Vendor Support"},"Product":{"code":"QUOEKUB","label":"System x->System x3250 M5->5458"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Line of Business":{"code":"","label":""}},{"Type":"HW","Business Unit":{"code":"BU016","label":"Multiple Vendor Support"},"Product":{"code":"QUOFE4B","label":"System x->System x3650 M4 BD->5466"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Line of Business":{"code":"","label":""}},{"Type":"HW","Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Product":{"code":"QUOFNI6","label":"Lenovo x86 servers->Lenovo System x3530 M4->7160"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Line of Business":{"code":"","label":""}},{"Type":"HW","Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Product":{"code":"QUOFNI8","label":"Lenovo x86 servers->Lenovo System x3630 M4->7158"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Line of Business":{"code":"","label":""}},{"Type":"HW","Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Product":{"code":"QUOFNIE","label":"Lenovo x86 servers->Lenovo System x3300 M4->7382"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Line of Business":{"code":"","label":""}},{"Type":"HW","Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Product":{"code":"QUOFNII","label":"Lenovo x86 servers->Lenovo System x3500 M4->7383"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Line of Business":{"code":"","label":""}},{"Type":"HW","Business Unit":{"code":"BU016","label":"Multiple Vendor Support"},"Product":{"code":"QUOFNIK","label":"Lenovo x86 servers->Lenovo System x3650 M4 BD->5466"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Line of Business":{"code":"","label":""}},{"Type":"HW","Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Product":{"code":"QUOFNIM","label":"Lenovo x86 servers->Lenovo System x3650 M4 HD->5460"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Line of Business":{"code":"","label":""}},{"Type":"HW","Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Product":{"code":"QUOFNIO","label":"Lenovo x86 servers->Lenovo System x3650 M4->7915"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Line of Business":{"code":"","label":""}}]

Document Information

Modified date:
30 January 2019

UID

ibm1MIGR-5095284