IBM Support

Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects IBM Tivoli Monitoring (CVE-2015-4000)

Security Bulletin


Summary

The Logjam vulnerability in TLS connections using the Diffie-Hellman (DH) key exchange protocol affects some components of IBM Tivoli Monitoring (ITM).

Vulnerability Details

CVEID: CVE-2015-4000
DESCRIPTION:
The TLS protocol could allow a remote attacker to obtain sensitive information, caused by the failure to properly convey a DHE_EXPORT ciphersuite choice. An attacker could exploit this vulnerability using man-in-the-middle techniques to force a downgrade to 512-bit export-grade cipher. Successful exploitation could allow an attacker to recover the session key as well as modify the contents of the traffic. This vulnerability is commonly referred to as "Logjam".
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/103294 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Affected Products and Versions

The following components of IBM Tivoli Monitoring (ITM) are affected by the LogJam vulnerability:
- Tivoli Enterprise Portal Server (TEPS)

    - embedded WebSphere Application Server – ITM versions 6.2.0 through 6.3.0 FP5
    - Portal Server Communication with Portal Clients when configured to use SSL over IIOP protocol - ITM versions 6.2.0 through 6.3.0 FP5
- Java (CANDLEHOME) - ITM Java-based agents using JSSE. - ITM versions 6.2.0 through 6.3.0 FP5

Remediation/Fixes


Portal Server



embedded WebSphere Application Server:


You should verify applying this fix does not cause any compatibility issues.

Fix VMRF Remediation/First Fix
6.X.X-TIV-ITM_EWAS_ALL_20150731 6.3.0.x http://www.ibm.com/support/docview.wss?uid=swg24040392
Patch to upgrade the embedded WebSphere Application Server (eWAS) shipped as part of the IBM Tivoli Monitoring portal server to version 8.0.0.10 plus additional Interim Fixes referred to as Interim Fix Block 2
Technote 6.2.3.x http://www.ibm.com/support/docview.wss?uid=swg21633720
Contains information about installing the embedded WebSphere Application Server (eWAS) patches for IBM Tivoli Monitoring 6.23. The link gives instructions to install eWAS 7.0 Fix Pack 37 (7.0.0.37) and Interim Fix block 1
Technote 6.2.2.x http://www.ibm.com/support/docview.wss?uid=swg21509259
Contains information about installing the embedded WebSphere Application Server (eWAS) patches for IBM Tivoli Monitoring 6.22. The link gives instructions are to install eWAS 6.1 Fix Pack 47 (6.1.0.47) and Interim Fix block 2.

For IBM Tivoli Monitoring 6.2.0 and 6.2.1, IBM recommends upgrading to a fixed, supported version/release of the product as listed above.


Portal Server Communication with Portal Clients:

Portal Server Communication with Portal Clients when configured to use SSL over IIOP protocol. SSL over IIOP is being used if both conditions below are true:
- HTTPS is not being used
    - applet.html file does not have the tep.connection.protocol=http or https AND
    - tep.jnlp file does not have tep.connection.protocol=https
- the KFW_INTERFACE_cnps_SSL is set to "Y" in the portal server environment file (Windows: kfwenv, UNIX/Linux: cq.config)


You should verify applying this fix does not cause any compatibility issues.
Fix VMRF Remediation/First Fix
6.3.0-TIV-ITM-FP0005-IV74486 6.3.0 http://www.ibm.com/support/docview.wss?uid=swg24040448
6.2.3-TIV-ITM-FP0005-IV74486 6.2.3 http://www.ibm.com/support/docview.wss?uid=swg24040448
6.2.2-TIV-ITM-FP0009-IV74486 6.2.2 http://www.ibm.com/support/docview.wss?uid=swg24040448
6.3.0-TIV-ITM-FP0006 6.3.0.x http://www.ibm.com/support/docview.wss?uid=swg24040390
Check link for status on availability.

For IBM Tivoli Monitoring 6.2.0 and 6.2.1, IBM recommends upgrading to a fixed, supported version/release of the product as listed above.

You should verify applying this fix does not cause any compatibility issues.


Java (CANDLEHOME) Remediation:



The IBM Tivoli Monitoring servers and base agents (those shipped as part of IBM Tivoli Monitoring Fix Packs) are not affected by this vulnerability. Only Java-based agents utilizing Java Secure Socket Extension (JSSE) which rely on the JRE in the IBM Tivoli Monitoring installation directory (for example, CANDLEHOME) can be affected. Agents affected will publish separate security bulletins and reference this bulletin for the remediation.

For systems where the affected agents are installed, the patch below should be installed which will update the shared Tivoli Enterprise-supplied JRE (jr component on UNIX/Linux) or Embedded JVM (JVM component on Windows). The technote Upgrading Shared Components for IBM Tivoli Monitoring Agents provides information on how shared libraries are used.

You should verify applying this fix does not cause any compatibility issues.
Fix VMRF Remediation/First Fix
6.X.X-TIV-ITM_JRE_CANDLEHOME-20150731 6.2.2 through 6.3.0 FP5 http://www.ibm.com/support/docview.wss?uid=swg24040391
6.3.0-TIV-ITM-FP0006 6.3.0.x http://www.ibm.com/support/docview.wss?uid=swg24040390
Check link for status on availability.

For IBM Tivoli Monitoring 6.2.0 and 6.2.1, IBM recommends upgrading to a fixed, supported version/release of the product as listed above.

Get Notified about Future Security Bulletins

References

Related information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowledgement

Reported to IBM by The WeakDH team at https://weakdh.org

Change History

31 July 2015: Original Version Published.
01 October 2015: The eWAS 6.2.3 technote section above should reference Fix Pack 37 not 33. Changed the line: "The link gives instructions to install eWAS 7.0 Fix Pack 33 (7.0.0.37) and Interim Fix block 1" to be "The link gives instructions to install eWAS 7.0 Fix Pack 37 (7.0.0.37) and Interim Fix block 1"
2016-05-17 - Updated expiration date for document.

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Document information

More support for: IBM Tivoli Monitoring V6

Software version: 6.2.0, 6.2.1, 6.2.2, 6.2.3, 6.3.0

Operating system(s): AIX, Linux, Solaris, Windows

Reference #: 1962739

Modified date: 04 August 2015


Translate this page: