Security Bulletin: Vulnerability in Rational Licensing could allow code execution
The security issue was originally published as a high security vulnerability and based on our ongoing technical assessment we have reduced the severity to medium. The vulnerability is in the licensing functionality used by some IBM Rational products. The products/versions that are affected are listed below and fixes are available per the table below.
|Subscribe to My Notifications to be notified of important product support alerts like this.
CVE ID: CVE-2011-1205
Description: The IBM Rational licensing implementation for Windows platforms is based on Microsoft COM framework. The licensing functionality is exposed to certain IBM Rational Programs through four different COM objects. The currently known attack vectors include opening local HTML files and allowing scripting in the "My Computer" zone or permitting the running of unsafe ActiveX controls in Internet Explorer. These are both considered unsafe behaviors.
Based on additional technical assessment of this security issue, IBM has lowered the base severity rating from high (CVSS 7.2), as originally reported, to medium (CVSS 6.2). At this time we have not identified a high risk exploitation vector for this vulnerability and we have no information indicating that there is an immediate risk of exploitation. IBM can not rule out other valid vectors and are continuing our evaluation; for this reason we have decided to inform our clients about this potential security issue and recommend that they install the appropriate fix as soon as possible.
As of 4/13/2011, IBM has not received any reports of customer issues related to this security vulnerability. The vulnerability was identified and reported to IBM by a security testing company, DBAPP Security.
CVSS Base Score: 6.2
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/66324 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N)
Affected Products and Versions
See table in remediation section for specific versions affected.
There are two solutions in the form of fixes and a Microsoft Security patch.
Microsoft Security Patch:
Apply the security update outlined in Microsoft Security Bulletin MS11-027.
IBM Product Versions and Applicable Fixes:
Workarounds and Mitigations
Get Notified about Future Security Bulletins
On-line Calculator v2
IBM Product Security Incident Response Blog
* 13 April 2011- Removed RCL Kill-bit_v2.zip file and steps as Microsoft's Security Fix has superseded this alternative risk mitigation.
* 05 April 2011- Changed base CVSS score, resulting in the advisory severity being lowered from high to medium
* 31 March 2011- Incremented RCL kill-bit.zip file to RCL kill-bit_v2.zip. The initial RCL Kill-bit.reg did not include all of the affected CLSIDs. If you have already applied RCL Kill-bit.reg, you will need to apply RCL Kill-bit_v2.
* 28 March 2011 - Original copy published.
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
More support for:
Rational License Key Server
Software version: 7.0, 126.96.36.199, 188.8.131.52, 7.0.1, 184.108.40.206, 220.127.116.11, 7.1, 18.104.22.168, 22.214.171.124, 7.1.1, 126.96.36.199, 188.8.131.52, 184.108.40.206, 220.127.116.11
Operating system(s): Windows
Reference #: 1470998
Modified date: 13 April 2011