Lucene search

K
ibmIBME919E9A36C657D0228D3DA8A63FA716B3583174E73FC9F478D6A0F12BD9E2448
HistoryJul 24, 2020 - 10:19 p.m.

Security Bulletin: Vulnerabilities in OpenSSL affect IBM Sterling Connect:Direct for Microsoft Windows (CVE-2016-2108, CVE-2016-2107)

2020-07-2422:19:08
www.ibm.com
33
ibm sterling connect:direct
openssl
microsoft windows
cve-2016-2108
cve-2016-2107
buffer underflow
arbitrary code
memory corruption
out-of-bounds write
sensitive information
aes cbc cipher
man-in-the-middle attack
poodle
fix
patch
upgrade

EPSS

0.969

Percentile

99.7%

Summary

OpenSSL vulnerabilities were disclosed on 3 May 2016 by the OpenSSL Project. OpenSSL is used by IBM Sterling Connect:Direct for Microsoft Windows. IBM Sterling Connect:Direct for Microsoft Windows has addressed the applicable CVEs.

Vulnerability Details

CVEID: CVE-2016-2108 DESCRIPTION: OpenSSL could allow a remote attacker to execute arbitrary code on the system, caused by a buffer underflow when deserializing untrusted ASN.1 structures. An attacker could exploit this vulnerability to corrupt memory and trigger an out-of-bounds write and execute arbitrary code on the system.
CVSS Base Score: 8.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/112853 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID: CVE-2016-2107 DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive information, caused by an error when the connection uses an AES CBC cipher and the server support AES-NI. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability by using the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt traffic.
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/112854 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)

Affected Products and Versions

IBM Sterling Connect:Direct for Microsoft Windows 4.5.00
IBM Sterling Connect:Direct for Microsoft Windows 4.5.01
IBM Sterling Connect:Direct for Microsoft Windows 4.6.0

Remediation/Fixes

Product

| VRMF|APAR|Remediation/First Fix
—|—|—|—
IBM Sterling Connect:Direct for Microsoft Windows| 4.5.00| IT15273| Apply 4.5.00 patch 060, available on IWM
IBM Sterling Connect:Direct for Microsoft Windows| 4.5.01| IT15273| Apply 4.5.01 patch 026, available on IWM
IBM Sterling Connect:Direct for Microsoft Windows| 4.6.0| IT15273| Apply 4.6.0.6, available on Fix Central
For older versions/releases IBM recommends upgrading to a fixed, supported version/release/platform of the product.

Note: A fix for CVE-2016-2108 was provided in OpenSSL versions 1.0.1o and was previously addressed by IBM Sterling Connect:Direct for Microsoft Window.

Workarounds and Mitigations

None