IBM Support

Security Bulletin: Rational Directory Administrator is affected by an Apache Tomcat vulnerability (CVE-2016-3092)

Created by Deepak Agarwal on
Published URL:
https://www.ibm.com/support/pages/node/551273
551273

Security Bulletin


Summary

Rational Directory Administrator, which is installed with Rational Directory Server (Tivoli) 5.2.1 iFix 9 and earlier, is affected by an Apache Tomcat security vulnerability (CVE-2016-3092). Install a new interim fix of Rational Directory Server to resolve this issue.

Vulnerability Details

Versions of Rational Directory Server (Tivoli) and Rational Directory Administrator are affected by the following vulnerability:

CVEID: CVE-2016-3092
DESCRIPTION:
Apache Tomcat is vulnerable to a denial of service, caused by an error in the Apache Commons FileUpload component. By sending file upload requests, an attacker could exploit this vulnerability to cause the server to become unresponsive.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/114336 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

Affected Products and Versions

Rational Directory Server (Tivoli) version 5.2.1 iFix 9 and earlier

Remediation/Fixes

The user interface for the migration functionality uses the vulnerable jar file: org.apache.commons.fileupload.jar. This functionality is deprecated in Rational Directory Server version 5.2.1 iFix 10.

Upgrade to Rational Directory Server version 5.2.1 iFix 10 and Rational Directory Administrator version 6.0.0.2 iFix 4.

There is a separate Console-based Migration Utility available in Rational Directory Administrator 6.0.0.2. Customers need to upgrade to the Rational Directory Administrator 6.0.0.2 and use the Console-based Migration Utility provided for migration. This utility does not use the vulnerable jar file org.apache.commons.fileupload.jar.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Important Note

IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.

References

Off

Acknowledgement

None

Change History

13 December 2016: Original copy published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SS4AKG","label":"Rational Directory Server"},"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Component":"General Information","Platform":[{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"}],"Version":"5.2.1","Edition":"","Line of Business":{"code":"LOB15","label":"Integration"}}]

Document Information

Modified date:
17 June 2018

UID

swg21990120