Security vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project.
| Subscribe to My Notifications to be notified of important product support alerts like this.
CVE-ID:CVE-2014-0224
**Description:**OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability to conduct man-in-the-middle attacks to decrypt and modify traffic.
CVSS Base Score: 5.8 **CVSS Temporal Score:**See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93586> for the current score *CVSS Environmental Score:**Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVE-ID:CVE-2014-3470
**Description:**OpenSSL is vulnerable to a denial of service, caused by the implementation of anonymous ECDH ciphersuites. A remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base Score: 4.3 **CVSS Temporal Score:**See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93589> for the current score *CVSS Environmental Score:**Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)
IBM Rational RequisitePro versions:
Version | Status |
---|---|
7.1.4 through 7.1.4.3 | Affected |
7.1.3 through 7.1.3.10 | Affected |
7.1.0.x, 7.1.1.x (all versions), 7.1.2 through 7.1.2.13 | Affected |
7.0.x | Not Affected |
You are vulnerable if you use ratlperl, ccperl or cqperl to run your own perl scripts, and those scripts use SSL connections.
Apply a fix pack for your appropriate ReqPro release. These fix packs include OpenSSL 1.0.1h
Affected Version | Applying the fix |
---|---|
7.1.4.x | Install Rational RequisitePro Fix Pack 4 (7.1.4.4) for 7.1.4 |
7.1.3.x | Install Rational RequisitePro Fix Pack 11 (7.1.3.11) for 7.1.3 |
7.1.2.x | Install Rational RequisitePro Fix Pack 14 (7.1.2.14) for 7.1.2 |
7.1.1.x | |
7.1.0.x | Install Rational RequisitePro Fix Pack 14 (7.1.2.14) for 7.1.2 |
**Note:**7.1.2.14 interoperates with all 7.1.x.x systems, and can be installed in the same way as 7.1.x.x fix packs. |
Avoid usage of ratlperl, ccperl or cqperl with SSL until you apply the fixes listed above.