IBM Support

Security Bulletin : AppScan Source uses a one-way hash without salt to encrypt highly sensitive information, which could allow a local attacker to decrypt information more easily (CVE-2016-3034)

Security Bulletin


Summary

IBM AppScan Source uses a one-way hash without salt to encrypt highly sensitive information, which could allow a local attacker to decrypt information more easily.

This only affects information stored in the AppScan Source database for local AppScan Source users. This does not affect users configured in AppScan Enterprise.

Vulnerability Details

CVEID: CVE-2016-3034

DESCRIPTION:
IBM AppScan Source uses a one-way hash without salt to encrypt highly sensitive information, which could allow a local attacker to decrypt information more easily.
CVSS Base Score: 4.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/114595 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

IBM Security AppScan Source 9.0.1, 9.0.2, 9.0.3

Remediation/Fixes

Note: This fix only affects deployments where local AppScan Source uses are defined in the local AppScan Source database. An upgrade of AppScan Enterprise to version 9.0.3.4 ifix2 or newer is required.

A highly secure cryptographic hashing algorithm is now used to store local AppScan Source user information in the AppScan Source database. The fix includes changes to AppScan Enterprise and AppScan Source:

(1) A change in AppScan Enterprise to use the new algorithm to authenticate an AppScan Source user.

(2) Change in AppScan Source clients to use the new algorithm during "create user" and "modify user" operations.

(3) A new option in AppScan Source dbmanager tool to update any existing user information in the AppScan Source database using the new hashing algorithm,

Upgrade steps:

AppScan Enterprise Server and AppScan Source can be upgraded to the versions with this fix in any order. All AppScan Enterprise Servers and AppScan Source clients must be upgraded prior to performing the following actions:

(1) Updating existing user information in the AppScan Source database. To update the user information, run the AppScan Source dbmanager tool on an AppScan Source database.

(2) Creating a new user or modifying an existing user in AppScan Source clients.

Impact on AppScan Enterprise and AppScan Source interoperability

Please refer to http://www-01.ibm.com/support/docview.wss?uid=swg21975211 for details on interoperability.

For configurations with local AppScan Source users defined in the AppScan Source database:


    Versions of source listed in this document (and newer) require AppScan Enterprise 9.0.3.4. ifix1 or newer.

For configurations that do not use local AppScan Source users:

    There is no change.

Get Notified about Future Security Bulletins

References

Complete CVSS v3 Guide
On-line Calculator v3

Related information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Document information

More support for: IBM Security AppScan Source
Database

Software version: 9.0.1, 9.0.2, 9.0.3, 9.0.3.1, 9.0.3.2, 9.0.3.3, 9.0.3.4, 9.0.3.5

Operating system(s): Linux, OS X, Windows

Reference #: 1995903

Modified date: 29 December 2016