IBM Support

SI55389 - OSP Update SNDSRVRQS and SNDPTFORD to address POODLE vulnera

PTF ( Program Temporary Fixes ) Cover letter


Order this fix

Abstract

OSP Update SNDSRVRQS and SNDPTFORD to address POODLE vulnera


Pre/Co-Requisite PTF / Fix List

REQ  LICENSED      PTF/FIX  LEVEL

TYPE PROGRAM  REL  NUMBER   MIN/MAX  OPTION
---- -------- ---  -------  -------  ------
PRE  5770SS1  710  SI55343   00/00    0000



NOTICE:
-------
Application of this PTF may disable or render ineffective programs that
use system memory addresses not generated by the IBM translator,
including programs that circumvent control technology designed to limit
interactive capacity to purchased levels.  This PTF may be a prerequisite
for future PTFs.  By applying this PTF you authorize and agree to the
foregoing.

This PTF is subject to the terms of the license agreement which
accompanied, or was contained in, the Program for which you are obtaining
the PTF.  You are not authorized to install or use the PTF except as part
of a Program for which you have a valid Proof of Entitlement.

SUBJECT TO ANY WARRANTIES WHICH CAN NOT BE EXCLUDED OR EXCEPT AS EXPLICITLY
AGREED TO IN THE APPLICABLE LICENSE AGREEMENT OR AN APPLICABLE SUPPORT
AGREEMENT, IBM MAKES NO WARRANTIES OR CONDITIONS EITHER EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OR CONDITIONS OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON INFRINGEMENT,
REGARDING THE PTF.

The applicable license agreement may have been provided to you in printed
form and/or may be viewed using the Work with Software Agreements (WRKSFWAGR)
CL command.





APAR Error Description / Circumvention

-----------------------------------------------
Update the SNDSRVRQS and SNDPTFORD commands and the Electronic
Service Agent (ESA) function to address the POODLE
vulnerability.

CVE-ID: CVE-2014-3566

DESCRIPTION: Product could allow a remote attacker to obtain
sensitive information, caused by a design error when using the
SSLv3 protocol. A remote user with the ability to conduct a
man-in-the-middle attack could exploit this vulnerability via a
POODLE (Padding Oracle On Downgraded Legacy Encryption) attack
to decrypt SSL sessions and access the plaintext of encrypted
connections.

CORRECTION FOR APAR SE60683 :
-----------------------------
Update the SNDSRVRQS and SNDPTFORD commands and the Electronic
Service Agent (ESA) function to address the POODLE
vulnerability.

CIRCUMVENTION FOR APAR SE60683 :
--------------------------------
None.


Activation Instructions


None.




Special Instructions


None.


Default Instructions

THIS PTF CAN BE APPLIED IMMEDIATE OR DELAYED.



Supersedes

PTF/FIX NO(S).  APAR TITLE LINE
--------------  ------------------------------------------------------------
   SI42564      OSP ecc Common Client update
   SI39279      OSP-OTHER SNDPTFORD and SNDSRVRQS Fixes
   SI37767      OSP-COMM-WAIT QTOCRUNPRX JOB LEAVING CONNECTION IN CLOSED ST

Summary Information

System.............................. i
Models..............................
Release............................. V7R1M0
Licensed Program............... 5770SS1
APAR Fixed.......................... SE60683
Superseded by:...................... View fix details for PTF SI66458
Recompile........................... N
Library............................. QSYSDIR
MRI Feature ........................ NONE
Cum Level........................... C5142710


System i Support

IBM disclaims all warranties, whether express or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. By furnishing this document, IBM grants no licenses to any related patents or copyrights. Copyright © 1996,1997,1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017 IBM Corporation. Any trademarks and product or brand names referenced in this document are the property of their respective owners. Consult the Terms of use link for trademark information.

Document information

More support for: i family

Software version: V7R1M0

Operating system(s): OS/400

Reference #: SI55389

Modified date: 07 January 2015