Security Bulletin
Summary
Bouncy Castle as used by IBM QRadar SIEM contains multiple vulnerabilities
Vulnerability Details
DESCRIPTION: Legion of the Bouncy Castle Java Cryptography APIs could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe reflection flaw in XMSS/XMSS^MT private key deserialization. By using specially-crafted private key, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/148041 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVEID: CVE-2017-13098
DESCRIPTION: Bouncy Castle could allow a remote attacker to obtain sensitive information, caused by an RSA Adaptive Chosen Ciphertext (Bleichenbacher) attack. By utilizing discrepancies in TLS error messages, an attacker could exploit this vulnerability to obtain the data in the encrypted messages once the TLS session has completed. Note: This vulnerability is also known as the ROBOT attack.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/136241 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
CVEID: CVE-2018-1000180
DESCRIPTION: Bouncy Castle could provide weaker than expected security, caused by an error in the Low-level interface to RSA key pair generator. The RSA Key Pairs generated in low-level API with added certainty may have less M-R tests than expected. An attacker could exploit this vulnerability to launch further attacks on the system.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/144810 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Affected Products and Versions
7.3
All WindowsDHCPProtocol versions before 7.3.0-QRADAR-PROTOCOL-WindowsDHCPProtocol-7.3-20201007124637
All SmbTailProtocol versions before 7.3.0-QRADAR-PROTOCOL-SmbTailProtocol-7.3-20201007124637
All OracleDatabaseListener versions before 7.3.0-QRADAR-PROTOCOL-OracleDatabaseListener-7.3-20201007124637
All WindowsExchangeProtocol versions before 7.3.0-QRADAR-PROTOCOL-WindowsExchangeProtocol-7.3-20201007124637
All WindowsIISProtocol versions before 7.3.0-QRADAR-PROTOCOL-WindowsIISProtocol-7.3-20201007124637
All EMCVMWareProtocol versions before 7.3.0-QRADAR-PROTOCOL-EMCVMWareProtocol-7.3-20200916171440
7.4
All WindowsDHCPProtocol versions before 7.4.0-QRADAR-PROTOCOL-WindowsDHCPProtocol-7.4-20201007123631
All SmbTailProtocol versions before 7.4.0-QRADAR-PROTOCOL-SmbTailProtocol-7.4-20201007123631
All OracleDatabaseListener versions before 7.4.0-QRADAR-PROTOCOL-OracleDatabaseListener-7.4-20201007123631
All WindowsExchangeProtocol versions before 7.4.0-QRADAR-PROTOCOL-WindowsExchangeProtocol-7.4-20201007123631
All WindowsIISProtocol versions before 7.4.0-QRADAR-PROTOCOL-WindowsIISProtocol-7.4-20201007123631
All EMCVMWareProtocol versions before 7.4.0-QRADAR-PROTOCOL-EMCVMWareProtocol-7.4-20200916171516
Remediation/Fixes
7.3
7.3.0-QRADAR-PROTOCOL-WindowsDHCPProtocol-7.3-20201007124637
7.3.0-QRADAR-PROTOCOL-SmbTailProtocol-7.3-20201007124637
7.3.0-QRADAR-PROTOCOL-OracleDatabaseListener-7.3-20201007124637
7.3.0-QRADAR-PROTOCOL-WindowsExchangeProtocol-7.3-20201007124637
7.3.0-QRADAR-PROTOCOL-WindowsIISProtocol-7.3-20201007124637
7.3.0-QRADAR-PROTOCOL-EMCVMWareProtocol-7.3-20200916171440
7.4
7.4.0-QRADAR-PROTOCOL-WindowsDHCPProtocol-7.4-20201007123631
7.4.0-QRADAR-PROTOCOL-SmbTailProtocol-7.4-20201007123631
7.4.0-QRADAR-PROTOCOL-OracleDatabaseListener-7.4-20201007123631
7.4.0-QRADAR-PROTOCOL-WindowsExchangeProtocol-7.4-20201007123631
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
References
Acknowledgement
Change History
28 Oct 2020: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
05 February 2021
Initial Publish date:
28 October 2020
UID
ibm16356449