IBM Support

Security Bulletin: Vulnerability in SSLv3 affects IBM eDiscovery Analyzer (CVE-2014-3566)

Created by Nilanjana Banerjee on
Published URL:
https://www.ibm.com/support/pages/node/254157
254157

Security Bulletin


Summary

SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled in IBM eDiscovery Analyzer

Vulnerability Details


CVE-ID: CVE-2014-3566

DESCRIPTION: Product could allow a remote attacker to obtain sensitive information, caused by a design error when using the SSLv3 protocol. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt SSL sessions and access the plaintext of encrypted connections.

CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/97013 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Affected Products and Versions


IBM eDiscovery Analyzer Version 2.1
IBM InfoSphere eDiscovery Analyzer Version 2.1.1
IBM eDiscovery Analyzer Version 2.2
IBM eDiscovery Analyzer Version 2.2.1
IBM eDiscovery Analyzer Version 2.2.2

Remediation/Fixes


The recommended solution is to apply the fix to the affected version, 2.2.2.1 as soon as practical. If you need further assistance, please contact IBM Support.

Go to Fix Central site and install the fix applicable to the version.

2.2.2.2 stream:

2.2.1.1 streams:

Workarounds and Mitigations


If you are on a version other than Version 2.2.2.1, apply the workaround.

IBM recommends that you review your entire environment to identify areas that enable the SSLv3 protocol and take appropriate mitigation and remediation actions. The most immediate mitigation action that can be taken is disabling SSLv3

To disable SSLv3 in all versions of IBM eDiscovery Analyzer, perform the following steps.

  1. Stop the IBM eDiscovery Analyzer server.
  2. Make a copy of the jetty.xml file. This file is located in the config directory in the location where IBM eDiscovery Analyzer was installed (on Windows the file will be in C:\Program Files (x86)\IBM\eDiscoveryAnalyzer\config by default, and on AIX it will be in /opt/IBM/eDiscoveryAnalyzer/config by default.)
  3. Open the original jetty.xml file (as located in the previous step) in a text editor.
  4. In the file, locate the following line:
    <New class="org.mortbay.jetty.security.SslSelectChannelConnector">
  5. Then locate this line within the scope of the "New" node located in the step above:
    <Set name="Protocol">SSLv3</Set>
  6. Change this line to be:
    <Set name="Protocol">TLSv1</Set>
  7. Save the jetty.xml file and exit the text editor.
  8. Start the IBM eDiscovery Analyzer server.

The steps above will disable SSLv3 and force the TLS protocol to be used in all HTTPS communications with IBM eDiscovery Analyzer.

Get Notified about Future Security Bulletins

References

Off

Change History

21st October 2014

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SSJKLP","label":"eDiscovery Analyzer"},"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Component":"--","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF033","label":"Windows"}],"Version":"2.2.2;2.2.1;2.2.0.0;2.1.1;2.1","Edition":"","Line of Business":{"code":"LOB10","label":"Data and AI"}}]

Document Information

Modified date:
17 June 2018

UID

swg21687499