Lucene search

K
ibmIBMBF245510DD3456E6B91B4CAC1041A675D62C74E268B2C0039096D2A32DE43FDE
HistorySep 15, 2022 - 6:54 p.m.

Security Bulletin: Multiple vulnerabilities in the IBM SDK for Java™ Technology Edition January 2015 CPU affect WebSphere Process Server

2022-09-1518:54:57
www.ibm.com
21
ibm
java technology
sslv3
jsse
libraries
security
websphere
process server
vulnerabilities
cve-2014-3566
cve-2014-6593
cve-2015-0400
cve-2015-0410
interim fixes
upgrade

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

3.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N

EPSS

0.975

Percentile

100.0%

Summary

There are multiple vulnerabilities in IBM SDK for Java™ Technology Edition that is used by WebSphere Process Server. These issues were disclosed as part of the IBM SDK for JavaTechnology Edition updates in January 2015.

Vulnerability Details

CVEID: CVE-2014-3566 DESCRIPTION: Multiple products could allow a remote attacker to obtain sensitive information, caused by a design error when using the SSLv3 protocol. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt SSL sessions and calculate the plaintext of secure connections.
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/97013 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVEID: CVE-2014-6593 DESCRIPTION: An unspecified vulnerability related to the JSSE component has partial confidentiality impact, partial integrity impact, and no availability impact.
CVSS Base Score: 4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/100153 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N)

CVEID: CVE-2015-0400 DESCRIPTION: An unspecified vulnerability related to the Libraries component could allow a remote attacker to obtain sensitive information.
CVSS Base Score: 5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/100149 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVEID: CVE-2015-0410 DESCRIPTION: An unspecified vulnerability related to the Security component could allow a remote attacker to cause a denial of service.
CVSS Base Score: 5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/100151 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Affected Products and Versions

WebSphere Process Server 6.1.x, 6.2.x, 7.0.x

If you are using an unsupported version, IBM strongly recommends to upgrade.

Remediation/Fixes

Install WebSphere Application Server interim fixes as appropriate for your current WebSphere Process Server version as described in the Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect WebSphere Application Server January 2015 CPU document.

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmwebsphere_process_serverMatch7.0.0.5
OR
ibmwebsphere_process_serverMatch7.0.0.4
OR
ibmwebsphere_process_serverMatch7.0.0.3
OR
ibmwebsphere_process_serverMatch7.0.0.2
OR
ibmwebsphere_process_serverMatch7.0.0.1
OR
ibmwebsphere_process_serverMatch7.0
OR
ibmwebsphere_process_serverMatch6.2.0.3
OR
ibmwebsphere_process_serverMatch6.2.0.2
OR
ibmwebsphere_process_serverMatch6.2.0.1
OR
ibmwebsphere_process_serverMatch6.2
OR
ibmwebsphere_process_serverMatch6.1.2.3
OR
ibmwebsphere_process_serverMatch6.1.2.2
OR
ibmwebsphere_process_serverMatch6.1.2.1
OR
ibmwebsphere_process_serverMatch6.1.2
OR
ibmwebsphere_process_serverMatch6.1.0.4
OR
ibmwebsphere_process_serverMatch6.1.0.3
OR
ibmwebsphere_process_serverMatch6.1.0.2
OR
ibmwebsphere_process_serverMatch6.1.0.1
OR
ibmwebsphere_process_serverMatch6.1
OR
ibmwebsphere_process_serverMatch6.0.2.5
OR
ibmwebsphere_process_serverMatch6.0.2.4
OR
ibmwebsphere_process_serverMatch6.0.2.3
OR
ibmwebsphere_process_serverMatch6.0.2.2
OR
ibmwebsphere_process_serverMatch6.0.2.1
OR
ibmwebsphere_process_serverMatch6.0.2
OR
ibmwebsphere_process_serverMatch6.0.1.6
OR
ibmwebsphere_process_serverMatch6.0.1.5
OR
ibmwebsphere_process_serverMatch6.0.1.4
OR
ibmwebsphere_process_serverMatch6.0.1.3
OR
ibmwebsphere_process_serverMatch6.0.1.2
OR
ibmwebsphere_process_serverMatch6.0.1.1
OR
ibmwebsphere_process_serverMatch6.0.1
OR
ibmwebsphere_process_serverMatch6.0
OR
ibmwebsphere_process_serverMatch6.2.0
OR
ibmwebsphere_process_serverMatch7.0.0
VendorProductVersionCPE
ibmwebsphere_process_server7.0.0.5cpe:2.3:a:ibm:websphere_process_server:7.0.0.5:*:*:*:*:*:*:*
ibmwebsphere_process_server7.0.0.4cpe:2.3:a:ibm:websphere_process_server:7.0.0.4:*:*:*:*:*:*:*
ibmwebsphere_process_server7.0.0.3cpe:2.3:a:ibm:websphere_process_server:7.0.0.3:*:*:*:*:*:*:*
ibmwebsphere_process_server7.0.0.2cpe:2.3:a:ibm:websphere_process_server:7.0.0.2:*:*:*:*:*:*:*
ibmwebsphere_process_server7.0.0.1cpe:2.3:a:ibm:websphere_process_server:7.0.0.1:*:*:*:*:*:*:*
ibmwebsphere_process_server7.0cpe:2.3:a:ibm:websphere_process_server:7.0:*:*:*:*:*:*:*
ibmwebsphere_process_server6.2.0.3cpe:2.3:a:ibm:websphere_process_server:6.2.0.3:*:*:*:*:*:*:*
ibmwebsphere_process_server6.2.0.2cpe:2.3:a:ibm:websphere_process_server:6.2.0.2:*:*:*:*:*:*:*
ibmwebsphere_process_server6.2.0.1cpe:2.3:a:ibm:websphere_process_server:6.2.0.1:*:*:*:*:*:*:*
ibmwebsphere_process_server6.2cpe:2.3:a:ibm:websphere_process_server:6.2:*:*:*:*:*:*:*
Rows per page:
1-10 of 351

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

3.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N

EPSS

0.975

Percentile

100.0%