Security Bulletin: GSKit SSL/TLS Record Length vulnerability in Tivoli Directory Server (CVE-2012-2191)

Flash (Alert)


Abstract

A vulnerability has been identified in the GSKit component utilized by Tivoli Directory Server (TDS). A specifically crafted malformed SSL/TLS data packet can cause the TDS server using GSKit to segmentation fault.. Remediation for the issue consists of updating GSKit 7 to version 7.0.4.41 or higher, and GSKit 8 to version 8.0.14.22 or higher.

Content

VULNERABILITY DETAILS

CVE ID: CVE-2012-2191

DESCRIPTION:
TDS uses GSKit for SSL/TLS connections. The GSKit implementation of CBC and AEAD Cipher Suites are vulnerable to an attack from a specifically crafted malformed SSL/TLS data packet. There are several ciphers supported by TDS that are included in these Suites. An attacker would need to act as a man-in-the-middle, intercepting the SSL data stream between any LDAP client (such as ldapsearch) and a TDS server that was using an affected cipher, and inject a malformed data packet into the stream. Were an attacker able to do so, they could cause the TDS server process to crash. The attack does not require local network access nor does it require authentication, but some degree of specialized knowledge and techniques are required. An exploit would not impact the confidentiality of information or the integrity of data, however accessibility of the system could be compromised.

CVSS Base Score: 5
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/75996 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

AFFECTED PLATFORMS
· All GSKit 7.0.x.x builds up to and including 7.0.4.40
· All GSKit 8.0.14.x up to and including 8.0.14.21
· All GSKit 8.0.15.x up to and including 8.0.15.3

REMEDIATION:
Tivoli Directory Server versions 6.0, 6.1 or 6.2 using GSKit 7 should update GSKit to version 7.0.4.41 or later. The following document explains how to obtain and install updates to GSKit 7 for Tivoli Directory Server:
GSKit V7 - Install, Uninstall and Upgrade instructions for Tivoli Directory Server

Tivoli Directory Server versions 6.3 using GSKit 8 should update GSKit to version 8.0.14.22 or later. The following document explains how to obtain and install updates to GSKit 8 for Tivoli Directory Server:
GSKit V8 - Install, Uninstall and Upgrade instructions for Tivoli Directory Server

WORKAROUND(S):
No workaround

MITIGATION(S):
No mitigation

REFERENCES:
· Complete CVSS Guide
· CVSS on-line Calculator V2
· X-Force Database
· CVE-2012-2191

RELATED INFORMATION:
· IBM Product Security Incident Response Program
· IBM Tivoli Directory Server Support

Date of Creation/Update Summary of Changes
2012/10/04 created

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.


Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.


Product Alias/Synonym

LDAP TDS ITDS IDS GSKit

Rate this page:

(0 users)Average rating

Add comments

Document information


More support for:

IBM Security Directory Server
General

Software version:

6.0, 6.1, 6.2, 6.3

Operating system(s):

AIX, HP Itanium, HP-UX, Linux pSeries, Linux xSeries, Linux zSeries, Solaris, Solaris Opteron, Windows 2003 server, Windows 2008 server, Windows 64bit

Software edition:

All Editions

Reference #:

1609029

Modified date:

2012-10-05

Translate my page

Machine Translation

Content navigation