Security Bulletin: IBM Rational ClearQuest security vulnerability fixes for CVE-2012-2203
IBM Rational ClearQuest uses the IBM GSKit component to establish SSL connections to an LDAP directory server for LDAP authentication. ClearQuest 22.214.171.124 and 126.96.36.199 install updated versions of GSKit which contain corrections for security vulnerability CVE-2012-2203
|Subscribe to My Notifications to be notified of important product support alerts like this.
CVE ID: CVE-2012-2203
Description: A vulnerability in relation to PKCS#12 operations and insertion of Trust Anchors exists with GSKit. PKCS#12 file format is not the usual format for ClearQuest deployments.
CVSS Base Score: 5.8
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/77280 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)
Affected Products and Versions
For ClearQuest v7.1.x: versions prior to 188.8.131.52.
For ClearQuest v8.0.x: versions prior to 184.108.40.206
Upgrade ClearQuest to the below versions or later.
Workarounds and Mitigations
Workarounds: ClearQuest deployments that are not using LDAP authentication are not affected.
Mitigation: PKCS#12 format is not the default file format deployed for ClearQuest. Do not change from CMS format.
Get Notified about Future Security Bulletins
* 25 September 2012: Original copy published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
More support for:
Software version: 7.1, 220.127.116.11, 18.104.22.168, 7.1.1, 22.214.171.124, 126.96.36.199, 188.8.131.52, 184.108.40.206, 220.127.116.11, 18.104.22.168, 22.214.171.124, 126.96.36.199, 188.8.131.52, 7.1.2, 184.108.40.206, 220.127.116.11, 18.104.22.168, 22.214.171.124, 126.96.36.199, 188.8.131.52, 184.108.40.206, 220.127.116.11, 8.0, 18.104.22.168, 22.214.171.124, 126.96.36.199, 188.8.131.52
Operating system(s): AIX, HP-UX, Linux, Solaris, Windows
Reference #: 1612036
Modified date: 06 December 2014
Translate this page: