Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Cognos Command Center (CVS-2015-7575)
There are multiple vulnerabilities in IBM® Runtime Environment Java™ Technology Edition, Version 6 that is used by IBM Cognos Command Center. These issues were disclosed as part of the IBM Java SDK updates in January 2016 and includes the vulnerability commonly referred to as “SLOTH”.
DESCRIPTION: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials. This vulnerability is commonly referred to as “SLOTH”.
CVSS Base Score: 7.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/109415 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/UI:U/C:H/I:L/A:N)
Affected Products and Versions
IBM Cognos Command Center 10.1 All Editions
IBM Cognos Command Center 10.2 All Editions
IBM Cognos Command Center 10.2.1 All Editions
IBM Cognos Command Center 10.2.2 All Editions
IBM Cognos Command Center 10.2.3 All Editions
The recommended solution is to apply the IBM JRE 6.0 SR16FP20 to the affected versions of
IBM Cognos Command Center.
The fix for all affected versions is found here: http://www.ibm.com/support/fixcentral/swg/quickorder?parent=Cognos&product=ibm/Information+Management/Cognos+Command+Center&release=10.2.3&platform=Windows+32-bit,+x86&function=fixId&fixids=10.2.3-BA-CCC-Win32-JRE-60SR16FP20
Installation instructions for applying this fix.
For Microsoft Windows servers where the Agent or the Server component is installed please follow this procedure:
Download the 32 bit IBM Java JRE (file name: ibm-java-jre-60-win-i386.zip, Size: 80.6 MB, Build: pwi3260sr16fp20-20160111_01(SR16 FP20)).
Stop the CccServer, CccQueue and CccAgent Microsoft Windows services.
For IBM Cognos Command Center 10.1 and 10.2: Rename the <INSTALLDIR>\Common\java directory to <INSTALLDIR>\Common\java.orig
For IBM Cognos Command Center 10.2.1:Rename the <INSTALLDIR>\Common\java.184.108.40.206 directory to <INSTALLDIR>\Common\java.220.127.116.11.orig
For IBM Cognos Command Center 10.2.2 and 10.2.3: Rename the <INSTALLDIR>\Common\java.6.0.16 directory to <INSTALLDIR>\Common\java.6.0.16.orig
For IBM Cognos Command Center 10.1 and 10.2: Unpack the content of the ibm-java-jre-60-win-i386.zip file to <INSTALLDIR>\Common\java
For IBM Cognos Command Center 10.2.1: Unpack the content of the ibm-java-jre-60-win-i386.zip file to <INSTALLDIR>\Common\java.18.104.22.168
For IBM Cognos Command Center 10.2.2 and 10.2.3: Unpack the content of the ibm-java-jre-60-win-i386.zip file to <INSTALLDIR>\Common\java.6.0.16.
Start the CccAgent, CccQueue and CccServer Microsoft Windows services.
Validate the installation by testing the connectivity to the agent using the CCC Client.
Upgrade instructions after applying this fix.
For all IBM Cognos Command Center installations with the above fix applied:
Before upgrading your installation to a newer version please revert to the original \java\ directory by following this procedure.
Please note, the directory called \java\ could also be \java.22.214.171.124\ or \java.6.0.16\ depending on your IBM Cognos Command Center version.
Stop the CccServer, CccQueue and CccAgent Windows services.
Rename the <INSTALLDIR>\Common\java directory to <INSTALLDIR>\Common\java.cve
Rename the <INSTALLDIR>\Common\java.orig directory to <INSTALLDIR>\Common\java
Proceed to upgrade your Cognos Command Center installation to a newer version.
After the upgrade to the newer version is done, please reapply this fix starting from Step 1.
You should verify applying this fix does not cause any compatibility issues.
Workarounds and Mitigations
Get Notified about Future Security Bulletins
On-line Calculator v2
Complete CVSS v3 Guide
On-line Calculator v3
CVE-2015-7575 was reported to IBM by Karthikeyan Bhargavan at INRIA in Paris, France
9 February 2016 Original Version Published.
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
|Business Analytics||Cognos Command Center|
More support for:
Cognos Command Center
Software version: 10.1, 10.2, 10.2.1, 10.2.2, 10.2.3
Operating system(s): Windows
Software edition: All Editions
Reference #: 1975832
Modified date: 09 February 2016