IBM Support

Security Bulletin: Vulnerability in SSLv3 affects Host On-Demand (CVE-2014-3566)

Security Bulletin


SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled in IBM Rational Host On-Demand.

Vulnerability Details

CVE-ID: CVE-2014-3566

Description: Product could allow a remote attacker to obtain sensitive information, caused by a design error when using the SSLv3 protocol. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt SSL sessions and access the plaintext of encrypted connections.

CVSS Base Score: 4.3
CVSS Temporal Score: See for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Affected Products and Versions

IBM Rational Host On-Demand 11.0.10 and earlier.


Fix is available starting in version Rational Host On-Demand 11.0.11

Clients who are on older unsupported versions of IBM Rational Host On-Demand are also advised to upgrade to IBM Rational Host On-Demand 11.0.11 or above.

Workarounds and Mitigations

IBM recommends that you review your entire environment to identify areas that enable the SSLv3 protocol and take appropriate mitigation and remediation actions. The most immediate mitigation action that can be taken is disabling SSLv3.

If you have selected Telnet – SSL only protocol in HOD for secure connection to Host, please follow the below instructions to disable it.

1. Open html file with deployment wizard on HOD sever

2. Navigate to session properties

3. Under connection, select Telnet – TLS protocol for secure connection

4. Save the file by clicking Next > Next and access the file from client machine.

At the same time, ensure that the host (IBM System z, IBM System i, or any other VT hosts) have SSLv3 disabled at the Telnet server.

Get Notified about Future Security Bulletins

Important Note

IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.





Change History

* 12 February 2015: Added link to download containing resolution
* 21 October 2014: Original copy published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.


According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{"Product":{"code":"SSS9FA","label":"Rational Host On-Demand"},"Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Component":"General Information","Platform":[{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"}],"Version":"11.0;;;;;;;11.0.6;;11.0.7;11.0.8;11.0.9;11.0.10","Edition":"","Line of Business":{"code":"","label":""}}]

Document Information

Modified date:
02 August 2018