Lucene search

K
ibmIBMBCD5F3560070EFB2F642216AB024C08BDEF9EE66283C42C7EB4E984464A29879
HistoryJun 17, 2018 - 2:51 p.m.

Security Bulletin: Vulnerability in SSLv3 affects IBM Tivoli Composite Application Manager for Transactions (CVE-2014-3566)

2018-06-1714:51:40
www.ibm.com
11

EPSS

0.975

Percentile

100.0%

Summary

SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled in IBM Tivoli Composite Application Manager for Transactions.

Vulnerability Details

CVE-ID: CVE-2014-3566

DESCRIPTION: Product could allow a remote attacker to obtain sensitive information, caused by a design error when using the SSLv3 protocol. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt SSL sessions and access the plaintext of encrypted connections.

CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/97013&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Affected Products and Versions

IBM Tivoli Composite Application Manager (ITCAM) for Transactions is affected. ITCAM for Transactions contains multiple sub components (Agents).

The Internet Service Monitor (ISM – Agent code ‘IS’) is affected in versions 7.1, 7.2, 7.3 and 7.4.

The Application Management Console (AMC – Agent code ‘AMC’) is affected in versions 7.1, 7.2, 7.3, 7.4.

Remediation/Fixes

ISM:

Product VRMF APAR Remediation/First Fix
7.4.0.0-TIV-CAMIS-IF0023 7.4.0.0 None http://www.ibm.com/support/docview.wss?uid=isg400001970
7.3.0.1-TIV-CAMIS-IF0032 7.3.0.1 None http://www.ibm.com/support/docview.wss?uid=isg400001982
7.2.0.3-TIV-CAMIS-IF0028 7.2.0.3 None http://www.ibm.com/support/docview.wss?uid=isg400001943
Will Not Fix 7.1.0.0 None Upgrade to 7.4.0.0-TIV-CAMIS-IF0023
AMC: Product VRMF APAR Remediation/First Fix
7.4.0.0-TIV-CAMRT-IF0024 7.4.0.0 None http://www.ibm.com/support/docview.wss?uid=isg400001980
7.3.0.1-TIV-CAMRT-IF0033 7.3.0.1 None http://www.ibm.com/support/docview.wss?uid=isg400001981
Will Not Fix 7.2.0.0 None Upgrade to 7.4.0.0-TIV-CAMRT-IF0024
Will Not Fix 7.1.0.0 None Upgrade to 7.4.0.0-TIV-CAMRT-IF0024

Workarounds and Mitigations

IBM recommends that you review your entire environment to identify areas that enable the SSLv3 protocol and take appropriate mitigation and remediation actions. The most immediate mitigation action that can be taken is disabling SSLv3.