EMC RSA BSAFE-C Toolkits, utilized by WebSphere Transformation Extender Secure Adapter Collection, could allow a remote attacker to obtain sensitive information.
Additionally, SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled in WebSphere Transformation Extender Secure Adapter Collection.
CVE ID:CVE-2014-4192
Description: EMC RSA BSAFE-C Toolkits could allow a remote attacker to obtain sensitive information, caused by the processing of certain requests for output bytes by the Dual_EC_DRBG implementation. By recovering the algorithm’s inner state, an attacker could exploit this vulnerability to obtain sensitive information.
CVSS Base Score: 5 **CVSS Temporal Score:**See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93832>[](<https://exchange.xforce.ibmcloud.com/vulnerabilities/92844>) for the current score *CVSS Environmental Score:**Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE ID:CVE-2014-4191
Description: EMC RSA BSAFE-C Toolkits could allow a remote attacker to obtain sensitive information, caused by the sending of a long series of random bytes during use of the Dual_EC_DRBG algorithm by the TLS implementation. By recovering the algorithm’s inner state, an attacker could exploit this vulnerability to obtain sensitive information.
CVSS Base Score: 5 **CVSS Temporal Score:**See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93833> for the current score *CVSS Environmental Score:**Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE-ID: CVE-2014-3566
DESCRIPTION: Product could allow a remote attacker to obtain sensitive information, caused by a design error when using the SSLv3 protocol. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt SSL sessions and access the plaintext of encrypted connections.
CVSS Base Score: 4.3 **CVSS Temporal Score:**See https://exchange.xforce.ibmcloud.com/vulnerabilities/97013 for the current score *CVSS Environmental Score:**Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)
WTX Secure Adapters Collection 8.4.1.0 - 8.4.1.2
WTX Secure Adapters Collection 8.4.0.0 - 8.4.0.5
WTX Secure Adapters Collection 8.3.0.0 - 8.3.0.6
WTX Secure Adapters Collection 8.2.0.0 - 8.2.0.6
WTX Secure Adapters Collection 8.1.0.0 - 8.1.0.5
Download and install the interim fix for APAR PI29359 from IBM Fix Central:
http://www.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/WebSphere+Transformation+Extender&release=All&platform=All&function=aparId&apars=PI29359
For releases running HP-UX on PA-RISC, contact IBM Support to request the fix.
IBM recommends that you review your entire environment to identify areas that enable the SSLv3 protocol and take appropriate mitigation and remediation actions. The most immediate mitigation action that can be taken is disabling SSLv3.
None.