IBM Support

IT13742: SLOTH: VULNERABILITIES IN TLS HANDSHAKE DUE TO USE OF MD5 SIGNATURES

Subscribe

You can track all active APARs for this component.

 

APAR status

  • Closed as program error.

Error description

  • The TLS protocol could allow weaker than expected security
    caused by a collision attack when using the MD5 hash function
    for signing a ServerKeyExchange message during a TLS handshake.
    An attacker could exploit this vulnerability using
    man-in-the-middle techniques to impersonate a TLS server and
    obtain credentials.
    

Local fix

Problem summary

  • DataPower firmware before 7.2.0.0 are vulnerable.
    

Problem conclusion

  • The fix will be in 6.0.0.18, 6.0.1.14, 7.0.0.11 & 7.1.0.8
    

Temporary fix

Comments

APAR Information

  • APAR number

    IT13742

  • Reported component name

    DATAPOWER

  • Reported component ID

    DP1234567

  • Reported release

    600

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt / Xsystem

  • Submitted date

    2016-02-11

  • Closed date

    2016-02-11

  • Last modified date

    2016-02-11

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

Modules/Macros

  • None
    0
    

Fix information

  • Fixed component name

    DATAPOWER

  • Fixed component ID

    DP1234567

Applicable component levels

  • R710 PSY

       UP

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SS9H2Y","label":"IBM DataPower Gateway"},"Component":"","ARM Category":[],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"6.0.0","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
11 February 2022