IBM Support

Security Bulletin: Vulnerabilities in GSKit affect IBM Rational ClearCase (CVE-2015-0138)

Security Bulletin


Summary

GSKit is an IBM component that is used by IBM Rational ClearCase. The GSKit that is shipped with IBM Rational ClearCase contains multiple security vulnerabilities including the “FREAK: Factoring Attack on RSA-EXPORT keys" TLS/SSL client and server vulnerability. IBM Rational ClearCase has addressed the applicable CVEs.

Vulnerability Details

CVEID: CVE-2015-0138
DESCRIPTION: A vulnerability in various IBM SSL/TLS implementations could allow a remote attacker to downgrade the security of certain SSL/TLS connections. An IBM SSL/TLS client implementation could accept the use of an RSA temporary key in a non-export RSA key exchange ciphersuite. This could allow a remote attacker using man-in-the-middle techniques to facilitate brute-force decryption of TLS/SSL traffic between vulnerable clients and servers.

This vulnerability is also known as the FREAK attack.

CVSS Base Score: 4.3
CVSS Temporal Score: See http://exchange.xforce.ibmcloud.com/#/vulnerabilities/100691 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Affected Products and Versions

Rational ClearCase 7.1.2.9 through 7.1.2.17, 8.0.0.4 through 8.0.0.14, and 8.0.1 through 8.0.1.7.
The IBM GSKit is used if ClearCase on Windows platforms is configured to integrate with IBM Rational ClearQuest, Rational Team Concert, or Jira with communication over SSL (https). This applies to any integration using Change Management Interface (CMI), and to non-CMI based UCM-enabled CQ integration via OSLC. If your ClearCase deployment is not using these integrations, or not using SSL with the integrations, then your deployment is not sensitive to this attack. The UCM-enabled CQ integration without using OSLC (SQUID) is not sensitive to this attack.
CMI and OSLC integrations

ClearCase Windows Client Version
Status
8.0.1 through 8.0.1.7
Affected if you use CMI or OSLC integrations
8.0.0.4 through 8.0.0.14
Affected if you use CMI or OSLC integrations
8.0 through 8.0.0.3
Not affected
7.1.2.9 through 7.1.2.16
Affected if you use CMI or OSLC integrations
7.1.2 through 7.1.2.8
Not affected
7.0.x, 7.1.0.x, 7.1.1.x
Not affected

Note: other components of ClearCase are subject to the "FREAK" attack, as disclosed in the following security bulletins:
Security Bulletin: A security vulnerability has been identified in IBM WebSphere Application Server shipped with IBM Rational ClearCase (CVE-2015-0138)
Security Bulletin: Vulnerabilities in OpenSSL affect Rational ClearCase (CVE-2014-3570, CVE-2014-3572, CVE-2015-0204)
Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Rational ClearCase (CVE-2015-0138, CVE-2014-6593, CVE-2015-0383, CVE-2015-0410)

Remediation/Fixes

The solution is to update to the latest fix pack.

Affected Versions
Applying the fix
8.0.1 through 8.0.1.7
Install Rational ClearCase Fix Pack 8 (8.0.1.8) for 8.0.1
8.0 through 8.0.0.14
Install Rational ClearCase Fix Pack 15 (8.0.0.15) for 8.0
7.1.2 through 7.1.2.17
7.1.1.x (all fix packs)
7.1.0.x (all fix packs)
Customers on extended support contracts should install Rational ClearCase Fix Pack 18 (7.1.2.18) for 7.1.2

You should verify applying this fix does not cause any compatibility issues.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Important Note

IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.

References

Off

Acknowledgement

None

Change History

* 23 March 2013: Original Copy published
* 17 April 2015: updated to cross-reference related fixes
* 24 June 2015: fix is now included in fix packs

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Internal Use Only

The previous fixes are on the test fix portal, included in the following TestFixes:

7.1.2.17.001
8.0.0.14.001
8.0.1.07.003

they can be installed using Installation Manager.

For 2015B, we will revise the instructions to apply a fix pack instead

The test fixes above supersede the previous manually-installed solution which was:

The fixes are on the test fix portal:


7.1.2.17_gskit
8.0.0.14_gskit
8.0.1.07_gskit

The fixes are LA iFixes that apply on top of the 2015A fix packs
(7.1.2.17, 8.0.0.14, 8.0.1.7). Customers should upgrade to those
releases before applying these fixes.

For each platform, for each affected release, there is a zip file on the
Rational fix portal with the fixes, and a matching README file with
manual installation instructions. The customer should download the
fixes and READMEs for their platform(s)/release(s).

The plan is to incorporate all these fixes in 2015B fix packs, but we
are publishing them early to meet the IBM security team's guidelines.

[{"Product":{"code":"SSSH27","label":"Rational ClearCase"},"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Component":"Integrations: IBM","Platform":[{"code":"PF033","label":"Windows"}],"Version":"7.1.2.10;7.1.2.11;7.1.2.12;7.1.2.13;7.1.2.14;7.1.2.15;7.1.2.16;7.1.2.17;7.1.2.8;7.1.2.9;8.0.0.10;8.0.0.11;8.0.0.12;8.0.0.13;8.0.0.14;8.0.0.4;8.0.0.5;8.0.0.6;8.0.0.7;8.0.0.8;8.0.0.9;8.0.1;8.0.1.1;8.0.1.2;8.0.1.3;8.0.1.4;8.0.1.5;8.0.1.6;8.0.1.7","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
10 July 2018

UID

swg21698750