IBM Support

Security Bulletin: GSKit certificate chain vulnerability in IBM Security Directory Server and Tivoli Directory Server (CVE-2013-6747)

Flashes (Alerts)


Abstract

A vulnerability has been identified in the GSKit component utilized by IBM Security Directory Server (ISDS) and IBM Tivoli Directory Server (TDS). A malformed certificate chain can cause the ISDS or TDS client application or server process using GSKit to hang or crash. Remediation for the issue consists of upgrading affected GSKit following the instructions at the end of this bulletin.

Content

VULNERABILITY DETAILS

CVE ID:
CVE-2013-6747


DESCRIPTION:
ISDS and TDS use GSKit for SSL/TLS connections. The GSKit implementation is vulnerable to an attack from a malformed certificate chain. Were an attacker to use such a certificate when initiating an SSL/TLS connection, they could cause the ISDS or TDS client application or server process to hang or crash.
The attack does not require local network access or authentication but specialized knowledge and techniques are required. An exploit would not impact the confidentiality of information or the integrity of data, however availability of the system can be compromised.

CVSS:
CVSS Base Score: 7.1
CVSS Temporal Score: https://exchange.xforce.ibmcloud.com/vulnerabilities/89863
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:C)


AFFECTED PLATFORMS
All supported IBM Security Directory Server and Tivoli Directory Server versions are affected.


REMEDIATION:

  • If using GSKit v7, upgrade to GSKit version 7.0.4.48 or higher as soon as possible.
  • If using GSKit v8, upgrade to GSKit version 8.0.50.16 or higher as soon as possible.



  • Vendor Fix(es):
    Tivoli Directory Server VersionGSKit VersionInterim Fix
    Tivoli Directory Server 6.1GSKit v76.1.0.59
    Tivoli Directory Server 6.2.0GSKit v76.2.0.34
    Tivoli Directory Server 6.3.0GSKit v86.3.0.26
    IBM Security Directory Server 6.3.1GSKit v86.3.3.1


    WORKAROUNDS:
    No workaround


    RELATED INFORMATION:

    · CVE-2013-6747
    · https://exchange.xforce.ibmcloud.com/vulnerabilities/89863
    · Complete CVSS Guide
    · X-Force Vulnerability Database
    · IBM Secure Engineering Web Portal
    · IBM Product Security Incident Response Blog


    CHANGE HISTORY:

    24 January 2014Initial publication

    *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.


    Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

    [{"Product":{"code":"SSVJJU","label":"IBM Security Directory Server"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":"Not Applicable","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"6.1;6.2;6.3;6.3.1","Edition":"","Line of Business":{"code":"LOB24","label":"Security Software"}}]

    Document Information

    Modified date:
    25 September 2022

    UID

    swg21662902