Security Bulletin
Summary
GSKit is an IBM component that is used by IBM Rational ClearCase. The GSKit that is shipped with IBM Rational ClearCase contains a security vulnerability. IBM Rational ClearCase has addressed the applicable CVEs.
Vulnerability Details
CVEID: CVE-2015-1788
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by an error when processing an ECParameters structure over a specially crafted binary polynomial field. A remote attacker could exploit this vulnerability to cause the application to enter into an infinite loop.
CVSS Base Score: 5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/103778 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Affected Products and Versions
Rational ClearCase 7.1.2.9 through 7.1.2.18, 8.0.0.4 through 8.0.0.15, and 8.0.1 through 8.0.1.8.
The IBM GSKit is used if ClearCase on Windows platforms is configured to integrate with IBM Rational ClearQuest, Rational Team Concert, or Jira with communication over SSL (https). This applies to any integration using Change Management Interface (CMI), and to non-CMI based UCM-enabled CQ integration via OSLC. If your ClearCase deployment is not using these integrations, or not using SSL with the integrations, then your deployment is not sensitive to this attack. The UCM-enabled CQ integration without using OSLC (SQUID) is not sensitive to this attack.
CMI and OSLC integrations
ClearCase Windows Client Version | Status |
8.0.1 through 8.0.1.8 | Affected if you use CMI or OSLC integrations |
8.0.0.4 through 8.0.0.15 | Affected if you use CMI or OSLC integrations |
8.0 through 8.0.0.3 | Not affected |
7.1.2.9 through 7.1.2.18 | Affected if you use CMI or OSLC integrations |
7.1.2 through 7.1.2.8 | Not affected |
7.0.x, 7.1.0.x, 7.1.1.x | Not affected |
Remediation/Fixes
The solution is to update to the latest fix pack.
Affected Versions | Applying the fix |
8.0.1 through 8.0.1.8 | Install Rational ClearCase Fix Pack 9 (8.0.1.9) for 8.0.1 |
8.0.0.4 through 8.0.0.15 | Install Rational ClearCase Fix Pack 16 (8.0.0.16) for 8.0 |
7.1.2.9 through 7.1.2.18 | Customers on extended support contracts should install Rational ClearCase Fix Pack 19 (7.1.2.19) for 7.1.2 |
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
Important Note
IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.
References
Acknowledgement
None
Change History
* 16 September 2015: Original Copy published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
Document Information
Modified date:
10 July 2018
UID
swg21961565