Security Bulletin
Summary
There are multiple vulnerabilities in IBM® SDKs Java™ Technology Edition, Versions 7 and 8 that is used by IBM Rational Software Architect, IBM Rational Software Architect for WebSphere Software and IBM Rational Software Architect RealTime. These issues were disclosed as part of the IBM Java SDK updates in Jan 2016 and includes the vulnerability commonly referred to as “SLOTH”.
Vulnerability Details
CVEID: CVE-2015-7575
DESCRIPTION: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials.
CVSS Base Score: 7.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/109415 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N)
CVEID: CVE-2016-0466
DESCRIPTION: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service.
CVSS Base Score: 5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/109948 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVEID: CVE-2016-0475
DESCRIPTION: An unspecified vulnerability related to the Libraries component has partial confidentiality impact, partial integrity impact, and no availability impact.
CVSS Base Score: 5.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/109946 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVEID: CVE-2016-0448
DESCRIPTION: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information.
CVSS Base Score: 4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/109949 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N)
Affected Products and Versions
Rational Software Architect, Rational Software Architect for WebSphere Software and Rational Software Architect RealTime: Ver 8.5 through 9.5
Remediation/Fixes
Update the IBM SDK, Java Technology Edition of the product to address this vulnerability:
|
|
|
Rational Software Architect (RSA) | 9.5 9.0 to 9.0.0.1 9.1 to 9.1.2.1 | IBM Java SDK/JRE 8 SR2 FP10 IFixes |
Rational Software Architect for WebSphere Software (RSA4WS) | 9.5 9.0 to 9.0.0.1 9.1 to 9.1.2.1 | IBM Java SDK/JRE 8 SR2 FP10 IFixes |
Rational Software Architect RealTime (RSART) | 9.5 9.0 to 9.0.0.1 9.1 to 9.1.2 | IBM Java SDK/JRE 8 SR2 FP10 IFixes |
Rational Software Architect (RSA) | 8.5 to 8.5.5.4 | IBM Java SDK/JRE 7 SR9 FP30 IFixes |
Rational Software Architect for WebSphere Software (RSA4WS) | 8.5 to 8.5.5.4 | IBM Java SDK/JRE 7 SR9 FP30 IFixes |
Rational Software Architect RealTime (RSART) | 8.5 to 8.5.1 | IBM Java SDK/JRE 7 SR9 FP30 IFixes |
Installation Instructions:
For instructions on installing this update using Installation Manager, review the topic Updating Installed Product Packages in the IBM Knowledge Center.
Instructions to download and install the update from the compressed files:
- Download the update files from Fix Central by following the link listed in the download table above
- Extract the compressed files in an appropriate directory.
For example, choose to extract to C:\temp\update
- Start IBM Installation Manager.
- On the Start page of Installation Manager, click File > Preferences, and then click Repositories. The Repositories page opens.
- On the Repositories page, click Add Repository.
- In the Add repository window, browse to or enter the file path to the repository.config file, which is located in the directory where you extracted the compressed files and then click OK.
For example, enter C:\temp\update\repository.config.
- Click OK to close the Preference page.
- Install the update as described in the the topic Updating Installed Product Packages in the IBM Knowledge Center for your product and version.
Workarounds and Mitigations
For CVE-2015-7575:
Users of Java 7 and later can address the issue by updating the /jre/lib/security/java.security file as follows (both steps are required):
· Add MD5 to the jdk.certpath.disabledAlgorithms property - e.g. jdk.certpath.disabledAlgorithms=MD2, RSA keySize < 1024, MD5
· Add MD5withRSA to the jdk.tls.disabledAlgorithms property - e.g. jdk.tls.disabledAlgorithms=SSLv3, RC4, DH keySize < 768, MD5withRSA
Get Notified about Future Security Bulletins
References
Acknowledgement
CVE-2015-7575 was reported to IBM by Karthikeyan Bhargavan at INRIA in Paris, France.
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Internal Use Only
PSIRT 4587, Record 69416
PSIRT 4590, Record 68991
Was this topic helpful?
Document Information
Modified date:
10 September 2020
UID
swg21976894