IBM Support

Security Bulletin: Vulnerabilities in IBM Java SDK affects IBM Application Delivery Intelligence v1.0.1, v1.0.1.1, and v1.0.2. (CVE-2016-2183, CVE-2016-5546, CVE-2016-5547,CVE-2016-5548, CVE-2016-5549)

Security Bulletin


Summary

There are multiple vulnerabilities in IBM® SDK Java™ Technology Edition, Version 7.1
that is used by IBM Application Delivery Intelligence v1.0.1, v1.0.1.1 and v1.0.2. This issue was disclosed as part of the IBM Java SDK updates in Jan 2017

Vulnerability Details


CVEID: CVE-2016-2183
DESCRIPTION:
 OpenSSL could allow a remote attacker to obtain sensitive information, caused by an error in the DES/3DES cipher, used as a part of the SSL/TLS protocol. By capturing large amounts of encrypted traffic between the SSL/TLS server and the client, a remote attacker able to conduct a man-in-the-middle attack could exploit this vulnerability to recover the plaintext data and obtain sensitive information. This vulnerability is known as the SWEET32 Birthday attack.
CVSS Base Score: 3.7
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/116337 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2016-5546
DESCRIPTION:
 An unspecified vulnerability related to the Libraries component has no confidentiality impact, high integrity impact, and no availability impact.
CVSS Base Score: 7.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/120869 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)

CVEID: CVE-2016-5547
DESCRIPTION:
 An unspecified vulnerability related to the Libraries component could allow a remote attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/120871 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2016-5548
DESCRIPTION:
 An unspecified vulnerability related to the Libraries component could allow a remote attacker to obtain sensitive information resulting in a high confidentiality impact using unknown attack vectors.
CVSS Base Score: 6.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/120864 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)

CVEID: CVE-2016-5549
DESCRIPTION:
 An unspecified vulnerability related to the Libraries component could allow a remote attacker to obtain sensitive information resulting in a high confidentiality impact using unknown attack vectors.
CVSS Base Score: 6.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/120863 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)

Affected Products and Versions

IBM Application Delivery Intelligence 1.0.1, 1.0.1.1, and 1.0.2

Remediation/Fixes

Customers need to do the following to apply the fix:

1. Stop the server. Navigate to the unzipped-archive/adi/server directory and run this script: server.shutdown
2. Delete jre directory from unzipped-archive/server/jre
3. Download ibm-java-jre-7.1-4.1, unzip it and copy the jre directory to unzipped-archive/server (you are providing the jre directory that you deleted in step 2).

Download links:
Windows:
https://www-945.ibm.com/support/fixcentral/swg/selectFixes?product=ibm%2FRational%2FIBM+Application+Delivery+Intelligence&fixids=ADI_1.0.1_1.0.2_security_windows_fp1&source=SAR&function=fixId&parent=ibm/Rational
Linux:
https://www-945.ibm.com/support/fixcentral/swg/selectFixes?product=ibm%2FRational%2FIBM+Application+Delivery+Intelligence&fixids=ADI_1.0.1_1.0.2_security_linux_fp1&source=SAR&function=fixId&parent=ibm/Rational

4. Navigate to the unzipped-archive/adi/server directory, open server.startup script using prefered text editor (e.g., Notepad for Windows or Vim Editor for Linux) and add one more option to the healthcenter parameter set:

Windows:
Modify the line numbered 125 (where HEALTHCENTER_OPTS parameter located) by adding a new healthcenter option:
-Dsun.rmi.registry.registryFilter=javax.rmi.CORBA.Stub

Before modification:
set HEALTHCENTER_OPTS=-agentlib:healthcenter -Dcom.ibm.java.diagnostics.healthcenter.agent.port=1972
After modification:
set HEALTHCENTER_OPTS=-agentlib:healthcenter -Dcom.ibm.java.diagnostics.healthcenter.agent.port=1972 -Dsun.rmi.registry.registryFilter=javax.rmi.CORBA.Stub

Linux:
Modify the line numbered 157 (where HEALTHCENTER_OPTS parameter located) by adding a new healthcenter option:
-Dsun.rmi.registry.registryFilter=javax.rmi.CORBA.Stub

Before modification:
export HEALTHCENTER_OPTS="-agentlib:healthcenter -Dcom.ibm.java.diagnostics.healthcenter.agent.port=1972"
After modification:
export HEALTHCENTER_OPTS="-agentlib:healthcenter -Dcom.ibm.java.diagnostics.healthcenter.agent.port=1972
-Dsun.rmi.registry.registryFilter=javax.rmi.CORBA.Stub"

Note, if the line numbers are not exactly matched, search parameter -Dcom.ibm.java.diagnostics.healthcenter.agent in server.startup script to find the line containing the health center parameter.

5. Start the server. Navigate to the unzipped-archive/adi/server directory and run this script: server.startup

Get Notified about Future Security Bulletins

References

Off

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SSKK7E","label":"IBM Application Delivery Intelligence for IBM Z"},"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Component":"--","Platform":[{"code":"PF016","label":"Linux"},{"code":"PF025","label":"Platform Independent"},{"code":"PF033","label":"Windows"}],"Version":"1.0.1;1.0.1.1;1.0.2","Edition":"","Line of Business":{"code":"LOB35","label":"Mainframe SW"}}]

Document Information

Modified date:
02 August 2018

UID

swg22000014