IBM Support

Resolving JazzSM DASH Vulnerability by Plugin 83875 SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam)

How To


Summary

The vulnerability by plugin 83875 SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam) is an attack in SSL/TLS connections with one or more Diffie-Hellman moduli less than or equal to 1024 bits.

The Logjam attacks through cryptanalysis, a third party may be able to find the shared secret in a short amount of time (depending on modulus size and attacker resources). This may allow an attacker to recover the plaintext or potentially violate the integrity of connections.

This vulnerability is inherited by JazzSM DASH from WebSphere Application Server.

The Logjam vulnerability does not occur on WebSphere Application Server from 8.5.5.12 or later. WebSphere Application Server is vulnerable to Logjam if lower than 8.5.5.12 per APAR:
http://www-01.ibm.com/support/docview.wss?uid=swg1PI68115

Document Location

Worldwide

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSEKCU","label":"Jazz for Service Management"},"Component":"","Platform":[{"code":"PF016","label":"Linux"}],"Version":"1.1.3.0, 1.1.3.1","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Log InLog in to view more of this document

This document has the abstract of a technical article that is available to authorized users once you have logged on. Please use Log in button above to access the full document. After log in, if you do not have the right authorization for this document, there will be instructions on what to do next.

Document Information

Modified date:
22 November 2019

UID

ibm11111059