IBM Support

Security Bulletin: Java Technology Edition Quarterly CPU - October 2014 for Rational Software Architect for WebSphere Software (CVE-2014-3566)

Security Bulletin


Summary

IBM SDK, which is based on an Oracle Java Development Kit (JDK), is shipped with Rational Software Architect, Rational Software Architect for Websphere Software and Rational Software Architect for RealTime Edition. Oracle has released the October 2014 critical patch updates (CPU) that contains security vulnerability fixes for the JDK. The IBM SDK has been updated to incorporate these fixes and security fixes that are specific to the IBM SDK.(CVE-2014-6457,CVE-2014-3065 and CVE-2014-3566).

Vulnerability Details

Subscribe to My Notifications to be notified of important product support alerts like this.
  • Follow this link for more information (requires login with your IBM ID)

CVE-ID: CVE-2014-6457

Description: An unspecified vulnerability related to the JSSE component has partial confidentiality impact, partial integrity impact, and no availability impact.

CVSS Base Score: 4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/97148 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N)


CVE-ID: CVE-2014-3065

Description: IBM Java SDK contains a vulnerability in which the default configuration for the shared classes feature potentially allows arbitrary code to be injected into the shared classes cache, which may subsequently be executed by other local users.

CVSS Base Score: 6
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/93629 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:L/AC:H/Au:S/C:C/I:C/A:C)


CVE-ID: CVE-2014-3566

Description: Product could allow a remote attacker to obtain sensitive information, caused by a design error when using the SSLv3 protocol. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt SSL sessions and access the plaintext of encrypted connections.

CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/97013 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Affected Products and Versions

Rational Software Architect 9.1.1 and earlier

Rational Software Architect for WebSphere Software 9.1.1 and earlier

Rational Software Architect RealTime Edition 9.1.1 and earlier

Remediation/Fixes

Update the Java Development Kit of the product to address this vulnerability:

Product VRMF Remediation/Download FixCentral Link
Rational Software Architect

Rational Software Architect for Websphere Software

Rational Software Architect Standard Edition
7.5.x to 7.5.5.5 iFix1
8.0.x to 8.0.4.2 iFix1
Rational Software Architect

Rational Software Architect for Websphere Software

Rational Software Architect RealTime Edition
9.0, 9.0.0.1,9.1,9.1.1

8.5 to 8.5.5.2


Installation Instructions:

For instructions on installing this update using Installation Manager, review the topic Updating Installed Product Packages in the IBM Knowledge Center.

Instructions to download and install the update from the compressed files:
  1. Download the update files from Fix Central by following the link listed in the download table above

  2. Extract the compressed files in an appropriate directory.

    For example, choose to extract to C:\temp\update

  3. Add the update repository location in IBM Installation Manager:

  4. Start IBM Installation Manager.

  5. On the Start page of Installation Manager, click File > Preferences, and then click Repositories. The Repositories page opens.

  6. On the Repositories page, click Add Repository.

  7. In the Add repository window, browse to or enter the file path to the repository.config file, which is located in the directory where you extracted the compressed files and then click OK.

    For example, enter C:\temp\updates\repository.config.

  8. Click OK to close the Preference page.

  9. Install the update as described in the the topic Updating Installed Product Packages in the IBM Knowledge Center for your product and version.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Complete CVSS v2 Guide
On-line Calculator v2

Related information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowledgement

None

Change History

* 03 December 2014: Original copy published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.


Cross reference information
Segment Product Component Platform Version Edition
Software Development Rational Software Architect Standard Edition Linux, Windows 7.5, 7.5.1, 7.5.2, 7.5.3, 7.5.4, 7.5.5, 7.5.5.1, 7.5.5.2, 7.5.5.3, 7.5.5.4, 7.5.5.5
Software Development Rational Software Architect Linux, OS X, Windows 8.0, 8.0.1, 8.0.2, 8.0.3, 8.0.4, 8.0.4.1, 8.0.4.2, 8.5, 8.5.1, 8.5.5, 8.5.5.1, 8.5.5.2, 9.0, 9.0.0.1, 9.1, 9.1.1
Software Development Rational Software Architect RealTime Edition Linux, Windows 8.5, 8.5.1, 9.0, 9.0.0.1, 9.1, 9.1.1

Document information

More support for: Rational Software Architect for WebSphere Software
General Information

Software version: 7.5, 7.5.1, 7.5.2, 7.5.3, 7.5.4, 7.5.5, 7.5.5.1, 7.5.5.2, 7.5.5.3, 7.5.5.4, 7.5.5.5, 8.0, 8.0.1, 8.0.2, 8.0.3, 8.0.4, 8.0.4.1, 8.0.4.2, 8.5, 8.5.1, 8.5.5, 8.5.5.1, 8.5.5.2, 9.0, 9.0.0.1, 9.1, 9.1.1

Operating system(s): Linux, OS X, Windows

Reference #: 1691787

Modified date: 03 December 2014