IBM Support

Security Bulletin: IBM Security Network Intrusion Prevention System can be affected by vulnerabilities in OpenSSL (CVE-2013-4353, CVE-2013-6450, and CVE-2013-6449)

Security Bulletin


Summary

The IBM Security Network Intrusion Prevention System can be affected by three vulnerabilities in OpenSSL. These vulnerabilities include crafting invalid TLS handshake to crash OpenSSL, using a flaw in Datagram TLS(DTLS) handling to crash an application and using a flaw to crash an application with TLS 1.2.

Vulnerability Details


The following information was provided by OpenSSL. In the case of IBM Security Network Intrusion Prevention System, the Local Management Interface, SSH and the security management network ports are affected by the vulnerabilities

CVE-ID: CVE-2013-4353

DESCRIPTION:


A carefully crafted invalid TLS handshake could crash OpenSSL with a NULL pointer exception. A malicious server could use this flaw to crash a connecting client. This issue only affected OpenSSL 1.0.1 versions.

The attack does not require authentication, local network access or specialized knowledge. An exploit could impact the availability of the system but the integrity of data and the confidentiality of information would not be compromised.


CVSS:

CVSS Base Score: 5.0
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/90201 for the current score


CVSS Environmental Score*: Undefined
CVSS Vector (AV:N/AC:L/Au:N/C:N/I:N/A:P)


CVE-ID: CVE-2013-6450

DESCRIPTION:


A flaw in DTLS handling can cause an application using OpenSSL and DTLS to crash. OpenSSL versions prior to 1.0.0 are not vulnerable. OpenSSL is vulnerable to a denial of service, caused by the failure to properly maintain data structures for digest and encryption contexts by the DTLS retransmission implementation. A remote attacker could exploit this vulnerability to cause the daemon to crash.

The attack does not require authentication or local network access but some degree of specialized knowledge and techniques are required. An exploit would not impact the confidentiality of information or the integrity of data, but the availability of the system could be compromised.


CVSS:

CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/90069 for the current score


CVSS Environmental Score*: Undefined
CVSS Vector (AV:N/AC:M/Au:N/C:N/I:N/A:P)



CVE ID: CVE-2013-6449

DESCRIPTION:

A flaw in OpenSSL can cause an application using OpenSSL to crash when using TLS version 1.2. This issue only affected OpenSSL 1.0.1 versions. OpenSSL is vulnerable to a denial of service, caused by an error in the ssl_get_algorithm2 function. A remote attacker could exploit this vulnerability using specially-crafted traffic from a TLS 1.2 client to cause the daemon to crash.

The attack does not require authentication or local network access but some degree of specialized knowledge and techniques are required. An exploit would not impact the confidentiality of information or the integrity of data, but the availability of the system could be compromised.




CVSS:

CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/90068 for the current score


CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)

Affected Products and Versions

Products: GX3002, GX4002, GX4004, GX4004-v2, GX5008, GX5008-v2, GX5108, GX5108-v2, GX5208, GX5208-v2, GX6116, GX7412, GX7412-10, GX7412-05, GX7800, GV200, GV1000
Firmware versions: 4.6.1

Remediation/Fixes

The following IBM Threat Fixpack have the fixes for these vulnerabilities:


for all IBM Security Network Intrusion Prevention System products at Firmware version 4.6.1

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Change History

14 February 2014 - initial publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SS9SBT","label":"Proventia Network Intrusion Prevention System"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":"Not Applicable","Platform":[{"code":"PF009","label":"Firmware"}],"Version":"4.6.1","Edition":"","Line of Business":{"code":"LOB24","label":"Security Software"}}]

Document Information

Modified date:
23 February 2022

UID

swg21664833