Security Bulletin
Summary
A security vulnerability impacts IBM Rational Directory Server (RDS) 5.2.x, 5.1.1.x and Rational Directory Administrator (RDA) 6.x Java Client library.
Vulnerability Details
Subscribe to My Notifications to be notified of important product support alerts like this.
|
CVEID: CVE-2014-3089
Description: The RDS Java Client library carries clear text password of root user. A potential hacker with this password information could connect to RDS and could exploit its consuming products data.
CVSS Base Score: 2.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/94255 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:N/A:N)
Affected Products and Versions
Product | Version |
Rational Directory Server (Tivoli) | 5.2 - 5.2.1_iFix002 |
Rational Directory Server (Apache) | 5.1.1 - 5.1.1.2_iFix003 |
Rational Directory Administrator | 6.0 and 6.0.0.1 |
Remediation/Fixes
Apply the following fix for your release of RDS.
Product | Download link |
IBM Rational Directory Server 5.2 (Tivoli) | RDS 5.2.1 iFix003 |
IBM Rational Directory Server 5.1.1 (Apache) | RDS 5.1.1.2 iFix004 |
IBM Rational Directory Administrator 6.0 or 6.0.0.1 | RDA 6.0 iFix002 |
Important Notes:
- If RDS (Tivoli/Apache) is patched with the fix above, it is mandatory for Rational Synergy to be patched with a fix, else the communication between RDS and Synergy will break. Review Security Bulletin: Critical Security Vulnerability in RDS Client library affecting Rational Synergy (CVE-2014-3089) for details.
- If RDS (Tivoli/Apache) is patched with the fix above, it is recommended (but not mandatory) for Rational Change to be patched with a fix. Review Security Bulletin: Critical Security Vulnerability in RDS Client library affecting Rational Change (CVE-2014-3089) for details.
- The above vulnerability in RDS does not affects Rational DOORS.
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
References
Acknowledgement
None
Change History
* 19 August 2014: Original copy published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Internal Use Only
PSIRT # 1844 Record # 39679
Was this topic helpful?
Document Information
Modified date:
16 June 2018
UID
swg21681554