IBM Support

Security Bulletin: Rational Test Control Panel component in Rational Test Workbench and Rational Test Virtualization Server uses an insecure hashing scheme for handling user passwords (CVE-2015-1913)

Security Bulletin


Summary

Rational Test Control Panel component stores MD5 hashes of user passwords, which has now proven to be insecure.

Vulnerability Details

CVE ID: CVE-2015-1913

Description: Rational Test Control Panel generates and stores an MD5 hash of users' passwords. The MD5 hash is persisted and used to authenticate the user the next time he/she logs into the server. The MD5 hash algorithm is understood to be vulnerable to an attack.

CVSS Base Score: 5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/101855 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Affected Products and Versions

Rational Test Control Panel component in Rational Test Workbench and Rational Test Virtualization Server versions:

  • 8.0.0.x
  • 8.0.1.x
  • 8.5.0.x
  • 8.5.1.x
  • 8.6.0.x
  • 8.7.0.x

Remediation/Fixes

The fixes for the CVE(s) mentioned above have been incorporated into the latest fixpacks available from IBM.

Upgrade your installation as follows:

Visit IBM Fix Central to search for, download and apply the following fixpacks for your version of product:

  • All 8.0.0.x -> 8.0.0.5
  • All 8.0.1.x -> 8.0.1.6
  • All 8.5.0.x -> 8.5.0.4
  • All 8.5.1.x -> 8.5.1.5
  • All 8.6.0.x -> 8.6.0.4
  • All 8.7.0.x -> 8.7.0.2

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

None

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SSBLQQ","label":"IBM Rational Test Workbench"},"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Component":"Rational Test Control Panel","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"},{"code":"PF033","label":"Windows"}],"Version":"8.0;8.0.0.1;8.0.0.2;8.0.0.3;8.0.0.4;8.0.1;8.0.1.1;8.0.1.2;8.0.1.3;8.0.1.4;8.0.1.5;8.5;8.5.0.1;8.5.0.2;8.5.0.3;8.5.1;8.5.1.1;8.5.1.2;8.5.1.3;8.5.1.4;8.6;8.6.0.1;8.6.0.2;8.6.0.3;8.7;8.7.0.1","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}},{"Product":{"code":"SSBLXN","label":"Rational Test Virtualization Server"},"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Component":"Rational Test Control Panel","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"},{"code":"PF033","label":"Windows"}],"Version":"8.0;8.0.0.1;8.0.0.2;8.0.0.3;8.0.0.4;8.0.1;8.0.1.1;8.0.1.2;8.0.1.3;8.0.1.4;8.0.1.5;8.5;8.5.0.1;8.5.0.2;8.5.0.3;8.5.1;8.5.1.1;8.5.1.2;8.5.1.3;8.5.1.4;8.6;8.6.0.1;8.6.0.2;8.6.0.3;8.7;8.7.0.1","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
17 June 2018

UID

swg21959298