Lucene search

K
ibmIBMF9BC443C8A73A169776E2C52F6AE8DF730B206D865193F14D59F7BE18252EDFB
HistorySep 14, 2018 - 6:40 p.m.

Security Bulletin: Aspera HSTS, HSTE and Desktop Client application is affected by openSSL vulnerabilities (CVE-2017-3738)

2018-09-1418:40:01
www.ibm.com
14

0.119 Low

EPSS

Percentile

95.4%

Summary

Aspera High-Speed Transfer Server (formerly known as Enterprise Server and Connect Server), High-Speed Transfer Endpoint (formerly known as Point-to-Point Client) and Desktop Client application have addressed the following openSSL vulnerabilities.

Vulnerability Details

CVEID: CVE-2017-3738 DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive information, caused by an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. An attacker could exploit this vulnerability to obtain information about the private key. Note: In order to exploit this vulnerability, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701.
CVSS Base Score: 3.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/136078 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

Affected Products Affected Versions
Aspera High-Speed Transfer Server 3.8.0 and earlier
Aspera High-Speed Transfer Endpoint 3.8.0 and earlier
Aspera Desktop Client 3.8.0 and earlier
 

Remediation/Fixes

Product VRMF APAR Remediation / First Fix
Aspera High-Speed Transfer Server 3.8.1 N/A https://downloads.asperasoft.com/en/downloads/1
Aspera High-Speed Transfer Endpoint 3.8.1 N/A https://downloads.asperasoft.com/en/downloads/7
Aspera Desktop Client 3.8.1 N/A https://downloads.asperasoft.com/en/downloads/2
 

Workarounds and Mitigations

None.

CPENameOperatorVersion
ibm asperaeq3.8.0