IBM Support

IT13742: SLOTH: VULNERABILITIES IN TLS HANDSHAKE DUE TO USE OF MD5 SIGNATURES

Subscribe

You can track all active APARs for this component.

APAR status

  • Closed as program error.

Error description

  • The TLS protocol could allow weaker than expected security
    caused by a collision attack when using the MD5 hash function
    for signing a ServerKeyExchange message during a TLS handshake.
    An attacker could exploit this vulnerability using
    man-in-the-middle techniques to impersonate a TLS server and
    obtain credentials.
    

Local fix

Problem summary

  • DataPower firmware before 7.2.0.0 are vulnerable.
    

Problem conclusion

  • The fix will be in 6.0.0.18, 6.0.1.14, 7.0.0.11 & 7.1.0.8
    

Temporary fix

Comments

APAR Information

  • APAR number

    IT13742

  • Reported component name

    DATAPOWER

  • Reported component ID

    DP1234567

  • Reported release

    600

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt / Xsystem

  • Submitted date

    2016-02-11

  • Closed date

    2016-02-11

  • Last modified date

    2016-02-11

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

Modules/Macros

  • None
    0
    

Fix information

  • Fixed component name

    DATAPOWER

  • Fixed component ID

    DP1234567

Applicable component levels

  • R710 PSY

       UP



Document information

More support for: IBM DataPower Gateways
General

Software version: 6.0.0

Reference #: IT13742

Modified date: 11 February 2016