Lucene search

K
ibmIBM8A34CD2C417DA1A44B2AE802DEA89EA0F52A3566FF092174684FB04555606DB1
HistoryJan 31, 2019 - 1:55 a.m.

Security Bulletin: Vulnerabilities in OpenSSL affect IBM Systems Director (CVE-2015-0286 )

2019-01-3101:55:01
www.ibm.com
6

0.944 High

EPSS

Percentile

99.2%

Summary

OpenSSL vulnerabilities were disclosed on March 18, 2015 by the OpenSSL Project. OpenSSL is used by IBM Systems Director. IBM Systems Director has addressed the applicable CVEs.

Vulnerability Details

Summary

OpenSSL vulnerabilities were disclosed on March 18, 2015 by the OpenSSL Project. OpenSSL is used by IBM Systems Director. IBM Systems Director has addressed the applicable CVEs.

Vulnerability Details

CVE-ID: CVE-2015-0286

Description: OpenSSL is vulnerable to a denial of service, caused by an error in the ASN1_TYPE_cmp function when attempting to compare ASN.1 boolean types. An attacker could exploit this vulnerability to crash any certificate verification operation and cause a denial of service.

CVSS Base Score: 5
CVSS Temporal Score: See <http://exchange.xforce.ibmcloud.com/vulnerabilities/101666&gt; for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Affected products and versions

IBM Systems Director

  • 5.2.x.x
  • 6.1.x.x
  • 6.2.0.x
  • 6.2.1.x
  • 6.3.0.0
  • 6.3.1.0
  • 6.3.1.1
  • 6.3.2.0
  • 6.3.2.1
  • 6.3.2.2
  • 6.3.3.0
  • 6.3.3.1
  • 6.3.5.0
  • 6.3.6.0

Remediation/Fixes

Releases 5.2.x.x, 6.1.x.x are unsupported and will not be fixed.

Please follow the instructions provided to apply fixes on the releases below.

  • 6.2.0.x
  • 6.2.1.x
  • 6.3.0.0
  • 6.3.1.0
  • 6.3.1.1
  • 6.3.2.0
  • 6.3.2.1
  • 6.3.2.2
  • 6.3.3.0
  • 6.3.3.1
  • 6.3.5.0
  • 6.3.6.0
  1. Click the following link: http://www.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Director&prod-uct=ibm/Director/SystemsDirector&release=All&platform=All&function=all
  2. Select the following fix pack: SysDir6_2_0_0_6_3_5_IT08795_IT08794_IT08796_IT08797_IT08805
    Note: This fix package includes all releases, and all platforms.
  3. Follow the Instructions beneath the table for your desired platform
    Product | VRMF | APAR | Associated Technote
    —|—|—|—
    | | | Go to <http://www.ibm.com/Search/?q=Search&gt;
    and search for the technote number.
    IBM Systems Director and IBM Systems Director Platform Agent | Xlinux Platform Agent 6.2.0.x to 6.3.6 | IT08795 | 743077676
    IBM Systems Director and IBM Systems Director Platform Agent | Windows Platform Agent 6.2.0.x to 6.3.6 | IT08794 | 743042634
    IBM Systems Director and IBM Systems Director Platform Agent | Power Linux Plat-form Agent 6.2.0.x to 6.3.6 | IT08796 | 743019341
    IBM Systems Director and IBM Systems Director Platform Agent | Zlinux Platform Agent 6.2.0.x to 6.3.6 | IT08797 | 743009956
    IBM Systems Director and IBM Systems Director Platform Agent | AIX Platform Agent 6.2.0.x to 6.3.6 | NA | 743096094
    IBM Systems Director Platform Agent | IBMi Platform Agent 6.2.0.x to 6.3.6 | NA | 743096094
    IBM Systems Director Platform Agent | KVM Platform Agent 6.3.5 and 6.3.6 | IT08805 | 743036431

Workarounds and Mitigations

None.

Reference

Related Information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowledgement

None.

Change History
18 May 2015: Original Copy Published
10 June 2015: Updated Copy Published

  • The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.