Lucene search

K
ibmIBMD3570BE110B3783A332CB217427414271B851FB390E6F1A5E4F69FBA81F8C175
HistorySep 10, 2020 - 5:03 p.m.

Security Bulletin: Multiple vulnerabilities in IBM Java SDK affects Rational Software Architect, Software Architect for WebSphere Software & Rational Software Architect RealTime

2020-09-1017:03:14
www.ibm.com
21
ibm java sdk
rational software architect
websphere software
realtime
sloth
tls protocol
jaxp
denial of service
confidentiality
integrity

EPSS

0.051

Percentile

93.0%

Summary

There are multiple vulnerabilities in IBM® SDKs Java™ Technology Edition, Versions 7 and 8 that is used by IBM Rational Software Architect, IBM Rational Software Architect for WebSphere Software and IBM Rational Software Architect RealTime. These issues were disclosed as part of the IBM Java SDK updates in Jan 2016 and includes the vulnerability commonly referred to as “SLOTH”.

Vulnerability Details

CVEID: CVE-2015-7575**

DESCRIPTION:** The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials.

CVSS Base Score: 7.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/109415 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N)

**
CVEID:** CVE-2016-0466**

DESCRIPTION:** An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service.

CVSS Base Score: 5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/109948 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

**
CVEID:** CVE-2016-0475**

DESCRIPTION:** An unspecified vulnerability related to the Libraries component has partial confidentiality impact, partial integrity impact, and no availability impact.

CVSS Base Score: 5.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/109946 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)

**
CVEID:** CVE-2016-0448**

DESCRIPTION:** An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information.

CVSS Base Score: 4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/109949 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N)

Affected Products and Versions

Rational Software Architect, Rational Software Architect for WebSphere Software and Rational Software Architect RealTime: Ver 8.5 through 9.5

Remediation/Fixes

Update the IBM SDK, Java Technology Edition of the product to address this vulnerability:

Product |

VRMF |

Remediation/First Fix
—|—|—
Rational Software Architect (RSA)
| 9.5
9.0 to 9.0.0.1
9.1 to 9.1.2.1| IBM Java SDK/JRE 8 SR2 FP10 IFixes
Rational Software Architect for WebSphere Software (RSA4WS)| 9.5
9.0 to 9.0.0.1
9.1 to 9.1.2.1| IBM Java SDK/JRE 8 SR2 FP10 IFixes
Rational Software Architect RealTime (RSART)| 9.5
9.0 to 9.0.0.1
9.1 to 9.1.2| IBM Java SDK/JRE 8 SR2 FP10 IFixes
Rational Software Architect (RSA)
| 8.5 to 8.5.5.4| IBM Java SDK/JRE 7 SR9 FP30 IFixes
Rational Software Architect for WebSphere Software (RSA4WS)| 8.5 to 8.5.5.4| IBM Java SDK/JRE 7 SR9 FP30 IFixes
Rational Software Architect RealTime (RSART)| 8.5 to 8.5.1| IBM Java SDK/JRE 7 SR9 FP30 IFixes

Installation Instructions:

For instructions on installing this update using Installation Manager, review the topic Updating Installed Product Packages in the IBM Knowledge Center.

Instructions to download and install the update from the compressed files:

  1. Download the update files from Fix Central by following the link listed in the download table above

  2. Extract the compressed files in an appropriate directory.

For example, choose to extract to `C:\temp\update

`
3. Start IBM Installation Manager.

  1. On the Start page of Installation Manager, click File > Preferences, and then clickRepositories. The Repositories page opens.

  2. On the Repositories page, click Add Repository.

  3. In the Add repository window, browse to or enter the file path to the repository.config file, which is located in the directory where you extracted the compressed files and then click OK.

For example, enter C:\temp\update\repository.config.

  1. Click OK to close the Preference page.

  2. Install the update as described in the the topic Updating Installed Product Packages in the IBM Knowledge Center for your product and version.

Workarounds and Mitigations

For CVE-2015-7575:

Users of Java 7 and later can address the issue by updating the /jre/lib/security/java.security file as follows (both steps are required):

· Add MD5 to the jdk.certpath.disabledAlgorithms property - e.g. jdk.certpath.disabledAlgorithms=MD2, RSA keySize < 1024, MD5

· Add MD5withRSA to the jdk.tls.disabledAlgorithms property - e.g. jdk.tls.disabledAlgorithms=SSLv3, RC4, DH keySize < 768, MD5withRSA

Get Notified about Future Security Bulletins

Subscribe to [My Notifications](< http://www-01.ibm.com/software/support/einfo.html&gt;) to be notified of important product support alerts like this.

References

Complete CVSS v2 Guide
On-line Calculator v2

Complete CVSS v3 Guide
On-line Calculator v3

Off

IBM Java SDK Security Bulletin

Related Information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowledgement

CVE-2015-7575 was reported to IBM by Karthikeyan Bhargavan at INRIA in Paris, France.

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Internal Use Only

PSIRT 4587, Record 69416
PSIRT 4590, Record 68991

[{“Product”:{“code”:“SSYK2S”,“label”:“Rational Software Architect Designer”},“Business Unit”:{“code”:“BU053”,“label”:“Cloud & Data Platform”},“Component”:“Modeling”,“Platform”:[{“code”:“PF016”,“label”:“Linux”},{“code”:“PF022”,“label”:“OS X”},{“code”:“PF033”,“label”:“Windows”}],“Version”:“8.5;8.5.1;8.5.5;8.5.5.1;8.5.5.2;8.5.5.3;8.5.5.4;9.0;9.0.0.1;9.1;9.1.1;9.1.2;9.1.2.1”,“Edition”:“”,“Line of Business”:{“code”:“LOB36”,“label”:“IBM Automation”}},{“Product”:{“code”:“SSYK2S”,“label”:“Rational Software Architect Designer”},“Business Unit”:{“code”:“BU053”,“label”:“Cloud & Data Platform”},“Component”:" “,“Platform”:[{“code”:”“,“label”:”“}],“Version”:“9.5”,“Edition”:”“,“Line of Business”:{“code”:“LOB36”,“label”:“IBM Automation”}},{“Product”:{“code”:“SS4JCV”,“label”:“Rational Software Architect for WebSphere Software”},“Business Unit”:{“code”:“BU053”,“label”:“Cloud & Data Platform”},“Component”:” “,“Platform”:[{“code”:“PF016”,“label”:“Linux”},{“code”:“PF022”,“label”:“OS X”},{“code”:“PF033”,“label”:“Windows”}],“Version”:“8.5;8.5.1;8.5.5;8.5.5.1;8.5.5.2;8.5.5.3;8.5.5.4;9.0;9.0.0.1;9.1;9.1.1;9.1.2;9.1.2.1”,“Edition”:”“,“Line of Business”:{“code”:“LOB15”,“label”:“Integration”}},{“Product”:{“code”:“SSYKBQ”,“label”:“Rational Software Architect Designer for WebSphere Software”},“Business Unit”:{“code”:“BU053”,“label”:“Cloud & Data Platform”},“Component”:” “,“Platform”:[{“code”:”“,“label”:”“}],“Version”:“9.5”,“Edition”:”“,“Line of Business”:{“code”:“LOB45”,“label”:“Automation”}},{“Product”:{“code”:“SS5JSH”,“label”:“Rational Software Architect RealTime Edition”},“Business Unit”:{“code”:“BU053”,“label”:“Cloud & Data Platform”},“Component”:” “,“Platform”:[{“code”:“PF016”,“label”:“Linux”},{“code”:“PF033”,“label”:“Windows”}],“Version”:“8.5;8.5.1;9.0;9.0.0.1;9.1;9.1.1;9.1.2;9.5”,“Edition”:”“,“Line of Business”:{“code”:”“,“label”:”"}}]