IBM Support

Security Bulletin: Vulnerabilities in WSS4J affects IBM Cúram (CVE-2015-0226 & CVE-2015-0227 )

Security Bulletin


Summary

IBM Cúram is shipped with a third party library called WSS4J, which is vulnerable to an attack on XML Encryption.

WSS4J also fails to properly enforce the requireSignedEncryptedDataElements property which leaves it vulnerable to XML Signature wrapping attacks .

Vulnerability Details

CVEID: CVE-2015-0226
DESCRIPTION:
Apache WSS4J could allow a remote attacker to obtain sensitive information, caused by Bleichenbacher's attack on XML Encryption. By sending a specially-crafted message, an attacker could exploit this vulnerability to decrypt the key and obtain sensitive information.
CVSS Base Score: 5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/100836 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVEID: CVE-2015-0227
DESCRIPTION:
Apache WSS4J could allow a remote attacker to bypass security restrictions, caused by the failure to properly enforce the requireSignedEncryptedDataElements property. An attacker could exploit this vulnerability using various types of wrapping attacks to bypass security restrictions and perform unauthorized actions.
CVSS Base Score: 5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/100837 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N)

Affected Products and Versions

IBM Cúram Social Program Management 5.2 SP6
IBM Cúram Social Program Management 6.0 SP2
IBM Cúram Social Program Management 6.0.4
IBM Cúram Social Program Management 6.0.5
IBM Cúram Social Program Management 6.1
IBM Care Management 6.0

Remediation/Fixes

Product

VRMFRemediation/First Fix
Cúram SPM5.2 SP65.2 provides no out of the box support for Axis 2 (See Workarounds & Mitigations).
Cúram SPM6.0 SP26Visit IBM Fix Central and upgrade to 6.0 SP2 EP27 or a subsequent 6.0 release
Cúram SPM6.0.4Visit IBM Fix Central and upgrade to 6.0.4.6iFix1 or a subsequent 6.0.4 release
Cúram SPM6.0.5Visit IBM Fix Central and upgrade to 6.0.5.9 or a subsequent 6.0.5 release
Cúram SPM6.1Visit IBM Fix Central and upgrade to 6.1.0.1FixPack or a subsequent 6.1.0 release
Cúram Care Management6.0See Workarounds & Mitigations

Workarounds and Mitigations

If your 5.2 version of Cúram is using Axis1 for web services the best remediation is to upgrade to a more recent version of Cúram. If this is not viable, contact IBM Cúram support for help with identification of mitigation.

For the Care Management release the download site has been updated to warn potential customers of security issues. Customers should contact IBM Cúram support if they require a security fix.

Get Notified about Future Security Bulletins

Important Note

IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.

References

Off

Change History

Initial publication 01 September 2015

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{"Product":{"code":"SS8S5A","label":"C\u00faram Social Program Management"},"Business Unit":{"code":"BU014","label":"Watson Health"},"Component":"Not Applicable","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF010","label":"HP-UX"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"},{"code":"PF033","label":"Windows"},{"code":"PF035","label":"z\/OS"}],"Version":"6.1;6.0.5;6.0.4;6.0;5.2","Edition":"","Line of Business":{"code":"","label":""}}]

Document Information

Modified date:
17 June 2018

UID

swg21964133