Lucene search

K
ibmIBM43F7675BC460D54528B6D0B354B5BC62450DC00B18E17138F4F9CD8B2C89FD7D
HistoryMar 13, 2024 - 2:30 p.m.

Security Bulletin: Multiple vulnerabilities in OpenSSL affects IBM Rational ClearCase

2024-03-1314:30:55
www.ibm.com
13
ibm rational clearcase
openssl
denial of service
authentication bypass
fix pack

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

AI Score

10

Confidence

High

EPSS

0.005

Percentile

75.6%

Summary

OpenSSL vulnerabilities were disclosed by the OpenSSL Project. OpenSSL is used by IBM Rational ClearCase. [CVE-2023-3817, CVE-2023-2975]

Vulnerability Details

CVEID:CVE-2023-3817
**DESCRIPTION:**OpenSSL is vulnerable to a denial of service, caused by a flaw when using the DH_check(), DH_check_ex() or EVP_PKEY_param_check() functions to check a DH key or DH parameters. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause long delays, and results in a denial of service condition.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/262046 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID:CVE-2023-2975
**DESCRIPTION:**OpenSSL could allow a remote attacker to bypass security restrictions, caused by AES-SIV cipher implementation. By sending a specially-crafted request using empty data entries as associated data, an attacker could exploit this vulnerability to bypass authentication validation.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/260817 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Rational ClearCase 10.0.1
IBM Rational ClearCase 9.1

Remediation/Fixes

Apply a fix pack as listed in the table below. The fix pack includes OpenSSL 3.0.12**.**

Affected Versions

|

Applying the fix

—|—
9.1 through 9.1.0.5| Install Rational ClearCase Fix Pack 6 (9.1.0.6) for 9.1
10.0.1| Install Rational ClearCase Fix Pack 1 (10.0.1.1) for 10.0.1

For 9.0.2.x and earlier releases, IBM recommends upgrading to a fixed, supported version/release/platform of the product.

_For 10.0.0.x releases, IBM recommends upgrading to 10.0.1.x release. _

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmrational_clearcaseMatch8.0.0
OR
ibmrational_clearcaseMatch8.0.1
OR
ibmrational_clearcaseMatch9.0.0
OR
ibmrational_clearcaseMatch9.0.1
OR
ibmrational_clearcaseMatch9.0.2
OR
ibmrational_clearcaseMatch9.1
VendorProductVersionCPE
ibmrational_clearcase8.0.0cpe:2.3:a:ibm:rational_clearcase:8.0.0:*:*:*:*:*:*:*
ibmrational_clearcase8.0.1cpe:2.3:a:ibm:rational_clearcase:8.0.1:*:*:*:*:*:*:*
ibmrational_clearcase9.0.0cpe:2.3:a:ibm:rational_clearcase:9.0.0:*:*:*:*:*:*:*
ibmrational_clearcase9.0.1cpe:2.3:a:ibm:rational_clearcase:9.0.1:*:*:*:*:*:*:*
ibmrational_clearcase9.0.2cpe:2.3:a:ibm:rational_clearcase:9.0.2:*:*:*:*:*:*:*
ibmrational_clearcase9.1cpe:2.3:a:ibm:rational_clearcase:9.1:*:*:*:*:*:*:*

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

AI Score

10

Confidence

High

EPSS

0.005

Percentile

75.6%