Lucene search

K
ibmIBM5188E91AE0F4CF160E78419684AC94C7D55CCBF952F552B855C2ED0F7706CFEA
HistorySep 25, 2022 - 9:06 p.m.

Security Bulletin: IBM Sterling Connect:Direct for OpenVMS. Unencrypted data transfers can occur even when SSL encryption is specified in the security configuration. (CVE-2013-4035)

2022-09-2521:06:56
www.ibm.com
12
ibm
sterling connect:direct
openvms
unencrypted data transfers
vulnerability
cve-2013-4035
ssl encryption
fix pack

EPSS

0.001

Percentile

45.7%

Abstract

Unencrypted data transfers can occur even when SSL encryption is specified in the security configuration.

Content

VULNERABILITY DETAILS:

CVEID:CVE-2013-4035
DESCRIPTION:
When Connect:Direct for OpenVMS is the server in a TCP/IP session, and the
client requests an unencrypted session, C:D OpenVMS will allow the unencrypted
session to proceed even if it is configured for SSL encryption with the client. The
correct response is to reject the requested unencrypted session.

CVSS Base Score: 3.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/86138 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:A/AC:M/Au:S/C:P/I:P/A:N)

AFFECTED PRODUCTS AND VERSIONS:
All supported versions are affected.

  • IBM Sterling Connect:Direct for OpenVMS, 3.6.0, 3.6.0.1
  • Sterling Connect:Direct for OpenVMS, legacy versions 3.4.00, 3.4.01, 3.5.00

REMEDIATION:

The recommended solution is to apply the specified fix pack as soon as possible. Available fixes are listed below.

- Version 3.6.0: apply fix pack 3.6.0.2 (Aug 2013) or any later fix pack (available
on Fix Central)
- Version 3.5.00: apply the August 2013 3.5.00 fix pack, or any later fix pack for
3.5.00 (available on IWM)
- Versions 3.4.00, 3.4.01: apply the August 2013 3.4.01 fix pack, or any later fix
pack for 3.4.01 (available on IWM)

Workaround(s) & Mitigation(s):
None known; apply fixes.

REFERENCES:
ยท Complete CVSS Guide
ยท On-line Calculator V2_ _

RELATED INFORMATION:
_IBM Secure Engineering Web Portal _
IBM Product Security Incident Response Blog

ACKNOWLEDGEMENT
None

CHANGE HISTORY
22 August 2013 Original draft published for review
28 August 2013 Submitted to PSIRT ops for final approval
30 August 2013 Submitted for publication

_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _

_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an โ€œindustry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.โ€ IBM PROVIDES THE CVSS SCORES โ€œAS ISโ€ WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{โ€œProductโ€:{โ€œcodeโ€:โ€œSSRS8Eโ€,โ€œlabelโ€:โ€œIBM Sterling Connect:Direct for OpenVMSโ€},โ€œBusiness Unitโ€:{โ€œcodeโ€:โ€œBU059โ€,โ€œlabelโ€:โ€œIBM Software w/o TPSโ€},โ€œComponentโ€:โ€œNot Applicableโ€,โ€œPlatformโ€:[{โ€œcodeโ€:โ€œPF021โ€,โ€œlabelโ€:โ€œOpenVMSโ€}],โ€œVersionโ€:โ€œ3.6;3.5โ€,โ€œEditionโ€:โ€œโ€,โ€œLine of Businessโ€:{โ€œcodeโ€:โ€œLOB59โ€,โ€œlabelโ€:โ€œSustainability Softwareโ€}}]

EPSS

0.001

Percentile

45.7%

Related for 5188E91AE0F4CF160E78419684AC94C7D55CCBF952F552B855C2ED0F7706CFEA