Security Bulletin
Summary
The security issue was originally published as a high security vulnerability and based on our ongoing technical assessment we have reduced the severity to medium. The vulnerability is in the licensing functionality used by some IBM Rational products. The products/versions that are affected are listed below and fixes are available per the table below.
Vulnerability Details
Subscribe to My Notifications to be notified of important product support alerts like this.
|
CVE ID: CVE-2011-1205
Description: The IBM Rational licensing implementation for Windows platforms is based on Microsoft COM framework. The licensing functionality is exposed to certain IBM Rational Programs through four different COM objects. The currently known attack vectors include opening local HTML files and allowing scripting in the "My Computer" zone or permitting the running of unsafe ActiveX controls in Internet Explorer. These are both considered unsafe behaviors.
Based on additional technical assessment of this security issue, IBM has lowered the base severity rating from high (CVSS 7.2), as originally reported, to medium (CVSS 6.2). At this time we have not identified a high risk exploitation vector for this vulnerability and we have no information indicating that there is an immediate risk of exploitation. IBM can not rule out other valid vectors and are continuing our evaluation; for this reason we have decided to inform our clients about this potential security issue and recommend that they install the appropriate fix as soon as possible.
As of 4/13/2011, IBM has not received any reports of customer issues related to this security vulnerability. The vulnerability was identified and reported to IBM by a security testing company, DBAPP Security.
CVSS Base Score: 6.2
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/66324 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N)
Affected Products and Versions
See table in remediation section for specific versions affected.
- AppScan Build Edition/Express Edition/Standard Edition
- AppScan Tester Edition/Reporting Console
- AppScan Enterprise Edition
- ClearCase/ClearCase MultiSite
- ClearCase Change Management Solution/ClearCase Change Management Solution Enterprise Edition
- ClearQuest/ClearQuest MultiSite
- Functional Tester Plus (Rational Functional Tester is not affected, Robot is affected)
- Lifecycle Package/Lifecycle Package with ClearCase
- Performance Tester
- Policy Tester Access Edition/Privacy Edition/Quality Edition
- Purify/PurifyPlus for Windows/PurifyPlus Enterprise Edition
- ProjectConsole
- RequisitePro
- Robot
- Rose Data Modeler/Developer for Java/Developer for Visual Studio/Enterprise/Modeler/Technical Developer, Developer for Visual Basic, ADA Professional
- SoDA
Remediation/Fixes
There are two solutions in the form of fixes and a Microsoft Security patch.
- The IBM product fixpacks should be implemented as soon as practical and your business needs dictate.
- IBM recommends applying the Microsoft Security patch as soon as possible.
Microsoft Security Patch:
Apply the security update outlined in Microsoft Security Bulletin MS11-027.
IBM Product Versions and Applicable Fixes:
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
References
Acknowledgement
None
Change History
* 13 April 2011- Removed RCL Kill-bit_v2.zip file and steps as Microsoft's Security Fix has superseded this alternative risk mitigation.
* 05 April 2011- Changed base CVSS score, resulting in the advisory severity being lowered from high to medium
* 31 March 2011- Incremented RCL kill-bit.zip file to RCL kill-bit_v2.zip. The initial RCL Kill-bit.reg did not include all of the affected CLSIDs. If you have already applied RCL Kill-bit.reg, you will need to apply RCL Kill-bit_v2.
* 28 March 2011 - Original copy published.
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Internal Use Only
Removed the following from the tables due to broken links:
7.0.0.4 – 7.0.0.6 7.0.1 | RATL PURIFY FOR WINDOWS | http://www.ibm.com/support/docview.wss?uid=swg24029478 |
7.0.0.4 – 7.0.0.6 7.0.1 | RATL PURIFYPLUS ENT EDITION (Bundle of PurifyPlus Windows and PurifyPlus Linux and Unix. Purify Plus for Linux and Unix is not affected) | http://www.ibm.com/support/docview.wss?uid=swg24029478 |
7.0.0.4 – 7.0.0.6 7.0.1 | RATL PURIFYPLUS FOR WINDOWS | http://www.ibm.com/support/docview.wss?uid=swg24029478 |
7.9.0 | RATL APPSCAN BUILD EDITION (Bundle of Standard Edition and Source Edition. Source Edition is not affected) | http://www.ibm.com/support/docview.wss?uid=swg24029447 |
7.9.0 – 7.9.0.3 | RATL APPSCAN EXPRESS EDITION | http://www.ibm.com/support/docview.wss?uid=swg24029447 |
7.9.0 – 7.9.0.3 | RATL APPSCAN STANDARD ED | http://www.ibm.com/support/docview.wss?uid=swg24029447 |
7.0.3 - 7.0.3.4 | RATL ROBOT | http://www.ibm.com/support/docview.wss?uid=swg24029464 |
8.0.0 – 8.0.0.1 | RATL APPSCAN ENTERPRISE ED | http://www.ibm.com/support/docview.wss?uid=swg24029389 |
8.0.0 – 8.0.0.1 | RATL APPSCAN REPORTING CONSOLE | http://www.ibm.com/support/docview.wss?uid=swg24029389 |
8.0.0 – 8.0.0.1 | RATL APPSCAN TESTER ED | http://www.ibm.com/support/docview.wss?uid=swg24029389 |
7.0.3 - 7.0.3.4 | RATL SODA | http://www.ibm.com/support/docview.wss?uid=swg24029454 |
7.0.1.3 - 7.0.1.11 | RATL SODA | http://www.ibm.com/support/docview.wss?uid=swg24029457 |
8.0.0 – 8.0.0.1 | RATL APPSCAN BUILD EDITION (Bundle of Standard Edition and Source Edition. Source Edition is not affected ) | http://www.ibm.com/support/docview.wss?uid=swg24029444 |
8.0.0 – 8.0.0.1 | RATL APPSCAN EXPRESS EDITION | http://www.ibm.com/support/docview.wss?uid=swg24029444 |
8.0.0 – 8.0.0.1 | RATL APPSCAN STANDARD ED | http://www.ibm.com/support/docview.wss?uid=swg24029444 |
------------------------------------------------------------------------------------------------
-- IBM CONFIDENTIAL FAQ: Vulnerability in IBM Rational Licensing could allow code execution
INTERNAL URL: http://bit.ly/h4QgKs
Alternative Solution: If for some reason you cannot apply the fix to the individual products, download and apply the following interim risk mitigation:
This solution contains information about modifying the system registry. Before making any modifications to the Microsoft Registry Editor, it is strongly recommended that you make a backup of the existing registry. For more information describing how to back up the registry, refer to Microsoft Knowledge Base article 256986 |
---|
- Save and decompress the attached file RCL kill-bit_v2.zip to a folder on each of the client machines which uses the Rational Licensing application.
RCL kill-bit_v2.zip
- Double click the RCL kill-bit_v2.reg file.
- Click Yes when the prompt shown below is displayed:
- The Microsoft Windows registry is modified, and the following alert is shown indicating the successful modification of the registry and the implementation of the interim fix:
Was this topic helpful?
Document Information
Modified date:
17 June 2018
UID
swg21470998