IBM Support

Security Bulletin: Vulnerability in SSLv3 affects IBM Rational ClearCase (CVE-2014-3566)

Security Bulletin


SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled in IBM Rational ClearCase.

Vulnerability Details

CVE-ID: CVE-2014-3566

Description: ClearCase could allow a remote attacker to obtain sensitive information, caused by a design error when using the SSLv3 protocol. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt SSL sessions and access the plaintext of encrypted connections.

CVSS Base Score: 4.3
CVSS Temporal Score: See for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Affected Products and Versions

The vulnerable components are the CCRC WAN Server / CM Server, ClearCase remote client, and the integrations with OSLC providers and with ClearQuest.

ClearCase version
8.0.1 through
8.0 through
7.1.2 through
7.1.0.x, 7.1.1.x (all versions and fix packs)


CCRC WAN Server/CM Server:
On your server host, apply fixes to IBM HTTP Server to disable SSLv3.
Follow the instructions in the following bulletin:
Security Bulletin: Vulnerability in SSLv3 affects IBM HTTP Server (CVE-2014-3566).
If your clients connect directly to SSL-enabled ports used by the CCRC profile of WebSphere Application Server, apply WAS fixes as described in
Security Bulletin: Vulnerability in SSLv3 affects IBM WebSphere Application Server (CVE-2014-3566).

Depending on your version of ClearCase, you may need extra steps to apply these fixes:

7.1.0.x, 7.1.1.x, and 7.1.2.xDocument 1390803 explains how to update IBM HTTP Server and WebSphere Application Server for ClearCase CM Servers at release 7.1.x. Consult those instructions when applying the fix.
8.0.0.x, 8.0.1.xApply the IBM HTTP Server and WebSphere Application Server fixes directly to your CCRC WAN server host. No ClearCase-specific steps are necessary.

Clients (CCRC and integration clients):

Apply a fix pack for your appropriate release of ClearCase. These fixes disable SSLv3 in the client.

Affected Versions
Applying the fix
Install Rational ClearCase Fix Pack 7 ( for 8.0.1
Install Rational ClearCase Fix Pack 14 ( for 8.0
Customers on extended support contracts should install Rational ClearCase Fix Pack 17 ( for 7.1.2

IBM recommends that you review your entire environment to identify areas that enable the SSLv3 protocol and take appropriate mitigation and remediation actions. The most immediate mitigation action that can be taken is disabling SSLv3. You should verify disabling SSLv3 does not cause any compatibility issues.

Workarounds and Mitigations

Enabling ClearCase clients to use SSLv3:
If you must use SSLv3 (not recommended due to its weaknesses), you can configure your clients to permit its use.

ClientHow to enable SSLv3
ClearCase remote client (CTE, rcleartool, CMAPI) for 8.0.0.x, 8.0.1.x releases
Note: 7.1.x releases of CCRC have never supported SSLv3, and cannot be configured to support SSLv3.
Set Java system properties in the runtime environment. For example, to enable it in the CTE stand-alone client, add these lines to <ccase-home>/RemoteClient/ctexplorer.ini:
Base ClearCase/ClearQuest integration v2Edit <ccase-home>/lib/CCCQ/ to set the new configuration setting CQCC_SERVER_SSLV3 to TRUE
Other integration clientsSet a user environment variable CCASE_ENABLE_SSLV3=1

Enabling CCRC WAN Server/CM Server to use SSLv3:
To configure your servers to allow SSLv3, follow the instructions in the WAS or IHS bulletins referenced above.
In addition, if your servers are configured to use a ClearCase integration such as CMI or UCM/CQ, you must set the environment variable in the WAS profile used to run the WAN server. Set the variable CCASE_ENABLE_SSLV3 to 1, following the instructions in tech note 1254153.

Get Notified about Future Security Bulletins

Important Note

IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.



Change History

* 19 November 2014: Original copy published.
* 18 March 2015: Revised for new fix pack containing fixes.

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.


According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{"Product":{"code":"SSSH27","label":"Rational ClearCase"},"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Component":"CCRC WAN Server","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF010","label":"HP-UX"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"},{"code":"PF033","label":"Windows"}],"Version":"7.1.2;;;;;;;;;;;;;;;;;8.0;;;;;;;;;;;;;;8.0.1;;;;;;","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
10 July 2018