Security Bulletin
Summary
Security vulnerabilities have been discovered in OpenSSL.
Vulnerability Details
Abstract
Security vulnerabilities have been discovered in OpenSSL.
Content
Vulnerability Details:
CVE-ID: CVE-2014-0224
Description: OpenSSL is vulnerable to a
man-in-the-middle attack, caused by the use of weak keying material
in SSL/TLS clients and servers. A remote attacker could exploit
this vulnerability using a specially-crafted handshake to conduct
man-in-the-middle attacks to decrypt and modify traffic.
CVSS Base Score: 5.8
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93586
for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE ID: CVE-2013-0169
Description: Allows Remote attackers to
conduct distinguishing attacks and plaintext-recovery attacks via
statistical analysis of timing data for crafted packets, aka the
"Lucky Thirteen" issue.
CVSS Base Score: 4.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/81902
CVSS Environmental Score: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVE-ID: CVE-2014-3470
Description: OpenSSL is vulnerable to a denial of
service, caused by the implementation of anonymous ECDH
ciphersuites. A remote attacker could exploit this vulnerability to
cause a denial of service.
CVSS Base Score: 4.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93589
for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)
Affected products and versions
IBM Systems Director: 5.2.x.x, 6.1.x.x, 6.2.0.x, 6.2.1.x, 6.3.0.0, 6.3.1.0, 6.3.1.1, 6.3.2.0, 6.3.2.1, 6.3.2.2, 6.3.3.0, 6.3.3.1, 6.3.5.0
Remediation:
Releases 6.2.0.x, 6.2.1.x, 6.3.0.0, 6.3.1.0, 6.3.1.1, 6.3.2.0, 6.3.2.1, 6.3.2.2, 6.3.3.0, 6.3.3.1, 6.3.5.0 are supported and will be fixed. Releases 5.2.x.x, 6.1.x.x are unsupported and will not be fixed.
- Click the following link:
http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Director&product=ibm/Director/SystemsDirector&release=All&platform=All&function=all
- Select the following fix pack:
SysDir6_2_x_0_6_3_x_0_IT02562_IT02549_IT02551_IT02560
Note: This fix package includes all releases, and all platforms.
- Follow the Instructions beneath the table for your desired platform
Product | VRMF | APAR | Associated Technote |
---|---|---|---|
IBM Systems Director and IBM Systems Director Platform Agent | Xlinux Platform Agent 6.2.0.x to 6.3.5 | IT02562 | http://www.ibm.com/support/entry/portal/support/ and search for Technote 709562501 |
IBM Systems Director and IBM Systems Director Platform Agent | Windows Platform Agent 6.2.0.x to 6.3.5 | IT02549 | http://www.ibm.com/support/entry/portal/support/ and search for Technote 709506455 |
IBM Systems Director and IBM Systems Director Platform Agent | Power Linux Platform Agent 6.2.0.x to 6.3.5 | IT02551 | http://www.ibm.com/support/entry/portal/support/ and search for Technote 709595132 |
IBM Systems Director and IBM Systems Director Platform Agent | Zlinux Platform Agent 6.2.0.x to 6.3.5 | IT02560 | http://www.ibm.com/support/entry/portal/support/ and search for Technote 709542145 |
IBM Systems Director and IBM Systems Director Platform Agent |
AIX Platform Agent 6.2.0.x to 6.3.5 | Not Applicable see Technote | http://www.ibm.com/support/entry/portal/support/ and search for Technote 709526284 |
IBM Systems Director Platform Agent | IBMi Platform Agent 6.2.0.x to 6.3.5 | Not Applicable see Technote | http://www.ibm.com/support/entry/portal/support/ and search for Technote 709526284 |
Workaround(s) & Mitigation(s):
None known
References:
Related Information:
IBM
Secure Engineering Web Portal
IBM Product Security
Incident Response Blog
Acknowledgement
None
Change History
26 June 2014: Original Copy Published
* The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.
Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
Get Notified about Future Security Bulletins
References
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
30 January 2019
UID
ibm1MIGR-5095985