Security Bulletin
Summary
There are multiple vulnerabilities in IBM® Runtime Environment Java™ Technology Edition that is used by IBM Tivoli Storage Manager for Virtual Environments: Data Protection for VMware (IBM Spectrum Protect™ for Virtual Environments) and IBM Tivoli Storage FlashCopy Manager for VMware (IBM Spectrum Protect™ Snapshot). These issues were disclosed as part of the IBM Java SDK updates in January 2016 and includes the vulnerability commonly referred to as "SLOTH".
Vulnerability Details
CVEID: CVE-2015-7575
DESCRIPTION: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials. This vulnerability is commonly referred to as “SLOTH”.
CVSS Base Score: 7.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/109415 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/UI:U/C:H/I:L/A:N)
Affected Products and Versions
The following products and versions are affected.
- Tivoli Storage Manager for Virtual Environments: Data Protection for VMware (IBM Spectrum Protect for Virtual Environments):
- 7.1.0.0 through 7.1.4.0
- 6.4.0.0 through 6.4.3.1
- 6.3.0.0 through 6.3.2.5 - Tivoli Storage FlashCopy Manager for VMware (IBM Spectrum Protect Snapshot):
- 4.1.0.0 through 4.1.4.0
- 3.2.0.0 through 3.2.0.6
- 3.1.0.0 through 3.1.1.3
Remediation/Fixes
|
Tivoli Storage Manager for VE: Data Protection for VMware Release | First Fixing VRMF Level | APAR | Client Platform | Link to Fix / Fix Availability Target |
| 7.1 | 7.1.4.1 | IT14180 | Linux Windows | http://www.ibm.com/support/docview.wss?uid=swg24041937 |
| 6.4 | 6.4.3.2 | IT14180 | Linux Windows | http://www.ibm.com/support/docview.wss?uid=swg24041370 |
| 6.3 | 6.3.2.6 | IT14180 | Linux Windows | http://www.ibm.com/support/docview.wss?uid=swg24037601 |
| Tivoli Storage FlashCopy Manager for VMware Release | First Fixing VRMF Level | APAR | Client Platform | Link to Fix / Fix Availability Target |
| 4.1 | 4.1.4.1 | IT14160 | Linux | http://www.ibm.com/support/docview.wss?uid=swg24041991 |
| 3.2 | 3.2.0.7 | IT14160 | Linux | ftp://public.dhe.ibm.com/storage/tivoli-storage-flashcopymanager/patches/v3r2/vmware/ |
| 3.1 | 3.1.1.4 | IT14160 | Linux | Fixes for release 3.1 are no longer available for download as this release is no longer supported. Customers requiring fixes should upgrade to the latest release which contains the most recent security fixes. Contact IBM Support with any questions. |
Workarounds and Mitigations
Tivoli Storage Manager for Virtual Environments: Data Protection for VMware 7.1 and Tivoli Storage FlashCopy Manager for VMware 4.1 which uses Java 7 can use the following workaround:
Update the /jre/lib/security/java.security file as follows (both steps are required):
· Add MD5 to the jdk.certpath.disabledAlgorithms property -
Example: jdk.certpath.disabledAlgorithms=MD2, RSA keySize < 1024, MD5
· Add MD5withRSA to the jdk.tls.disabledAlgorithms property -
Example: jdk.tls.disabledAlgorithms=SSLv3, RC4, DH keySize < 768, MD5withRSA
Due to using earlier versions of Java, there is no workaround for Tivoli Storage Manager for Virtual Environments: Data Protection for VMware 6.4 and 6.3 and Tivoli Storage FlashCopy Manager for VMware 3.2 and 3.1.
Get Notified about Future Security Bulletins
References
Acknowledgement
CVE-2015-7575 was reported to IBM by Karthikeyan Bhargavan at INRIA in Paris, France
Change History
31 March 2016: Original version published
13 April 2018 - Fix download information
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
Document Information
Modified date:
17 June 2018
UID
swg21978694