Security Bulletin
Summary
SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled in IBM eDiscovery Analyzer
Vulnerability Details
CVE-ID: CVE-2014-3566
DESCRIPTION: Product could allow a remote attacker to obtain sensitive information, caused by a design error when using the SSLv3 protocol. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt SSL sessions and access the plaintext of encrypted connections.
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/97013 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)
Affected Products and Versions
IBM eDiscovery Analyzer Version 2.1
IBM InfoSphere eDiscovery Analyzer Version 2.1.1
IBM eDiscovery Analyzer Version 2.2
IBM eDiscovery Analyzer Version 2.2.1
IBM eDiscovery Analyzer Version 2.2.2
Remediation/Fixes
The recommended solution is to apply the fix to the affected version, 2.2.2.1 as soon as practical. If you need further assistance, please contact IBM Support.
Go to Fix Central site and install the fix applicable to the version.
2.2.2.2 stream:
2.2.1.1 streams:Workarounds and Mitigations
If you are on a version other than Version 2.2.2.1, apply the workaround.
IBM recommends that you review your entire environment to identify areas that enable the SSLv3 protocol and take appropriate mitigation and remediation actions. The most immediate mitigation action that can be taken is disabling SSLv3
To disable SSLv3 in all versions of IBM eDiscovery Analyzer, perform the following steps.
- Stop the IBM eDiscovery Analyzer server.
- Make a copy of the jetty.xml file. This file is located in the config directory in the location where IBM eDiscovery Analyzer was installed (on Windows the file will be in C:\Program Files (x86)\IBM\eDiscoveryAnalyzer\config by default, and on AIX it will be in /opt/IBM/eDiscoveryAnalyzer/config by default.)
- Open the original jetty.xml file (as located in the previous step) in a text editor.
- In the file, locate the following line:
<New class="org.mortbay.jetty.security.SslSelectChannelConnector">
- Then locate this line within the scope of the "New" node located in the step above:
<Set name="Protocol">SSLv3</Set>
- Change this line to be:
<Set name="Protocol">TLSv1</Set>
- Save the jetty.xml file and exit the text editor.
- Start the IBM eDiscovery Analyzer server.
The steps above will disable SSLv3 and force the TLS protocol to be used in all HTTPS communications with IBM eDiscovery Analyzer.
Get Notified about Future Security Bulletins
References
Change History
21st October 2014
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
Document Information
Modified date:
17 June 2018
UID
swg21687499