OpenSSL vulnerabilities were disclosed on 1 March 2016 by the OpenSSL Project. OpenSSL is used by IBM Sterling Connect:Direct for Microsoft Windows. IBM Sterling Connect:Direct for Microsoft Windows has addressed the applicable CVEs.
CVEID: CVE-2016-0799 DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive information, caused by a memory error in the BIO_printf() functions. An attacker could exploit this vulnerability using specially crafted data to trigger an out-of-bounds read.
CVSS Base Score: 3.7
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/111143> for the current score
CVSS Environmental Score: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
CVEID: CVE-2016-0702 DESCRIPTION: OpenSSL could allow a local attacker to obtain sensitive information, caused by a side-channel attack against a system based on the Intel Sandy-Bridge microarchitecture. An attacker could exploit this vulnerability to recover RSA keys.
CVSS Base Score: 2.9
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/111144> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
IBM Sterling Connect:Direct for Microsoft Windows 4.5.00
IBM Sterling Connect:Direct for Microsoft Windows 4.5.01
IBM Sterling Connect:Direct for Microsoft Windows 4.6.0
Product
| VRMF|APAR|Remediation/First Fix
—|—|—|—
IBM Sterling Connect:Direct for Microsoft Windows| 4.5.00| IT15273| Apply 4.5.00 patch 060, available on IWM
IBM Sterling Connect:Direct for Microsoft Windows| 4.5.01| IT15273| Apply 4.5.01 patch 026, available on IWM
IBM Sterling Connect:Direct for Microsoft Windows| 4.6.0| IT15273| Apply 4.6.0.6, available on Fix Central
For older versions/releases IBM recommends upgrading to a fixed, supported version/release/platform of the product.
None