Security Bulletin : AppScan Source uses a one-way hash without salt to encrypt highly sensitive information, which could allow a local attacker to decrypt information more easily (CVE-2016-3034)
IBM AppScan Source uses a one-way hash without salt to encrypt highly sensitive information, which could allow a local attacker to decrypt information more easily.
This only affects information stored in the AppScan Source database for local AppScan Source users. This does not affect users configured in AppScan Enterprise.
DESCRIPTION: IBM AppScan Source uses a one-way hash without salt to encrypt highly sensitive information, which could allow a local attacker to decrypt information more easily.
CVSS Base Score: 4.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/114595 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N)
Affected Products and Versions
IBM Security AppScan Source 9.0.1, 9.0.2, 9.0.3
Note: This fix only affects deployments where local AppScan Source uses are defined in the local AppScan Source database. An upgrade of AppScan Enterprise to version 18.104.22.168 ifix2 or newer is required.
|IBM Security AppScan Source||22.214.171.124||AppScanSource-126.96.36.199-Windows-PSIRT8-iFix
|IBM Security AppScan Source||9.0.2||AppScanSource-188.8.131.52-Windows-PSIRT8-iFix
|IBM Security AppScan Source||9.0.1||AppScanSource-184.108.40.206-Windows-PSIRT8-iFix
A highly secure cryptographic hashing algorithm is now used to store local AppScan Source user information in the AppScan Source database. The fix includes changes to AppScan Enterprise and AppScan Source:
(1) A change in AppScan Enterprise to use the new algorithm to authenticate an AppScan Source user.
(2) Change in AppScan Source clients to use the new algorithm during "create user" and "modify user" operations.
(3) A new option in AppScan Source dbmanager tool to update any existing user information in the AppScan Source database using the new hashing algorithm,
AppScan Enterprise Server and AppScan Source can be upgraded to the versions with this fix in any order. All AppScan Enterprise Servers and AppScan Source clients must be upgraded prior to performing the following actions:
(1) Updating existing user information in the AppScan Source database. To update the user information, run the AppScan Source dbmanager tool on an AppScan Source database.
(2) Creating a new user or modifying an existing user in AppScan Source clients.
Impact on AppScan Enterprise and AppScan Source interoperability
Please refer to http://www-01.ibm.com/support/docview.wss?uid=swg21975211 for details on interoperability.
For configurations with local AppScan Source users defined in the AppScan Source database:
Versions of source listed in this document (and newer) require AppScan Enterprise 220.127.116.11. ifix1 or newer.
For configurations that do not use local AppScan Source users:
There is no change.
Get Notified about Future Security Bulletins
On-line Calculator v3
IBM Product Security Incident Response Blog
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
More support for:
IBM Security AppScan Source
Software version: 9.0.1, 9.0.2, 9.0.3, 18.104.22.168, 22.214.171.124, 126.96.36.199, 188.8.131.52, 184.108.40.206
Operating system(s): Linux, OS X, Windows
Reference #: 1995903
Modified date: 29 December 2016