IBM Support

Security Bulletin: TLS padding vulnerability affects IBM HTTP Server (CVE-2014-8730)

Security Bulletin


Transport Layer Security (TLS) padding vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) like attack affects IBM HTTP Server.

Vulnerability Details

CVE-ID: CVE-2014-8730

IBM HTTP Server could allow a remote attacker to obtain sensitive information, caused by the failure to check the contents of the padding bytes when using CBC cipher suites of some TLS implementations. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) like attack to decrypt sensitive information and calculate the plain text of secure connections.

CVSS Base Score: 4.3
CVSS Temporal Score: See for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Affected Products and Versions

This vulnerability affects all versions and releases of IBM HTTP Server (powered by Apache) component in all editions of WebSphere Application Server and bundling products.

  • Version 8.5.5
  • Version 8.5
  • Version 7.0
  • Version 6.1
  • Version 6.0


The recommended solutions is to apply the interim fix, Fix Pack or PTF containing APAR PI31516 for each named product as soon as practical. APAR PI31516 enables the strict CBC padding by default. The PI31516 interim fix for IBM HTTP Server (IHS) 7.0 and newer also includes the update for PI27904 (SSLV3 vulnerability CVE-2014-3566) which disables SSLv3 by default.

For affected IBM HTTP Server for WebSphere Application Server:
For V8.5.0.0 through Full Profile:

· Upgrade to a minimum of Fix Pack or later then apply Interim Fix PI31516

· Apply Fix Pack or later.

For V8.0 through

· Upgrade to a minimum of Fix Pack or later and then apply Interim Fix PI31516

· Apply Fix Pack or later.

For V7.0.0.0 through

· Upgrade to a minimum of Fix Pack or later and then apply Interim Fix PI31516

· Apply Fix Pack or later.

For V6.1.0.0 through
· Upgrade to Fix Pack and then apply Interim Fix PI31516

For V6.0.0.0 through

· Upgrade to Fix Pack, contact IBM Support to get the Interim Fix for PI31516 and then apply the fix

Workarounds and Mitigations

For all versions and releases of Apache based IBM HTTP server, IBM recommends enabling strict CBC padding enforcement. Add the following directive to the httpd.conf file, for each context that contains "SSLEnable", to enable strict CBC padding enforcement.

    # Enable strict CBC padding
    SSLAttributeSet 471 1
NOTE: Enabling strict CBC padding enforcement has the following prerequisites:

* Maintenance levels:,, or later
-- OR
* Any older fixpack/release with any one of the following interim fixes applied: PI05309, PI08502, PI09443, PI13422, PI19700, PI26894

Stop and restart IHS for the changes to take affect.


If you start IHS with the -f command line argument, or you use the "Include" directive to include alternate configuration files, you may need to search those filenames for SSLEnable.
If you configure SSL with SSLEnable in the global (non-virtualhost) scope, you will need to move SSLEnable into a virtualhost scope to add SSLAttributeSet

You should verify applying this configuration change does not cause any compatibility issues.

Get Notified about Future Security Bulletins

Important Note

IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.


Vulnerability in SSLv3 affects IBM HTTP Server



Change History

10 December 2014: original version published
16 January 2015: Ifixes available to change the default
28 January 2015: add links back to CVE-2014-3566
5 February 2015: added minimum levels
1 June 2015: clarified wording for version 6.0.2 to contact IBM support

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.


Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SSEQTJ","label":"IBM HTTP Server"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":"SSL","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF010","label":"HP-UX"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"},{"code":"PF033","label":"Windows"}],"Version":"8.5.5;8.5;8.0;7.0;6.1;6.0.2","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
07 September 2022