ID CVE-2015-0138
Summary GSKit in IBM Tivoli Directory Server (ITDS) 6.0 before 6.0.0.73-ISS-ITDS-IF0073, 6.1 before 6.1.0.66-ISS-ITDS-IF0066, 6.2 before 6.2.0.42-ISS-ITDS-IF0042, and 6.3 before 6.3.0.35-ISS-ITDS-IF0035 and IBM Security Directory Server (ISDS) 6.3.1 before 6.3.1.9-ISS-ISDS-IF0009 does not properly restrict TLS state transitions, which makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the "FREAK" issue, a different vulnerability than CVE-2015-0204.
References
Vulnerable Configurations
  • IBM Tivoli Directory Server 6.0.0.73
    cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.73
  • IBM Tivoli Directory Server 6.1.0.66
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.66
  • IBM Tivoli Directory Server 6.1.0.65
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.65
  • IBM Tivoli Directory Server 6.1.0.64
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.64
  • IBM Tivoli Directory Server 6.1.0.63
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.63
  • IBM Tivoli Directory Server 6.1.0.62
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.62
  • IBM Tivoli Directory Server 6.1.0.61
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.61
  • IBM Tivoli Directory Server 6.1.0.60
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.60
  • IBM Tivoli Directory Server 6.1.0.59
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.59
  • IBM Tivoli Directory Server 6.1.0.58
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.58
  • IBM Tivoli Directory Server 6.1.0.57
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.57
  • IBM Tivoli Directory Server 6.1.0.56
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.56
  • IBM Tivoli Directory Server 6.1.0.55
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.55
  • IBM Tivoli Directory Server 6.1.0.54
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.54
  • IBM Tivoli Directory Server 6.1.0.53
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.53
  • IBM Tivoli Directory Server 6.1.0.52
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.52
  • IBM Tivoli Directory Server 6.1.0.51
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.51
  • IBM Tivoli Directory Server 6.1.0.50
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.50
  • IBM Tivoli Directory Server 6.1.0.9
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.9
  • IBM Tivoli Directory Server 6.1.0.8
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.8
  • IBM Tivoli Directory Server 6.1.0.7
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.7
  • IBM Tivoli Directory Server 6.1.0.6
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.6
  • IBM Tivoli Directory Server 6.1.0.5
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.5
  • IBM Tivoli Directory Server 6.1.0.49
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.49
  • IBM Tivoli Directory Server 6.1.0.48
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.48
  • IBM Tivoli Directory Server 6.1.0.47
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.47
  • IBM Tivoli Directory Server 6.1.0.46
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.46
  • IBM Tivoli Directory Server 6.1.0.45
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.45
  • IBM Tivoli Directory Server 6.1.0.4
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.4
  • IBM Tivoli Directory Server 6.1.0.41
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.41
  • IBM Tivoli Directory Server 6.1.0.42
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.42
  • IBM Tivoli Directory Server 6.1.0.43
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.43
  • IBM Tivoli Directory Server 6.1.0.44
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.44
  • IBM Tivoli Directory Server 6.1.0.40
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.40
  • IBM Tivoli Directory Server 6.1.0.39
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.39
  • IBM Tivoli Directory Server 6.1.0.38
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.38
  • IBM Tivoli Directory Server 6.1.0.37
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.37
  • IBM Tivoli Directory Server 6.1.0.36
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.36
  • IBM Tivoli Directory Server 6.1.0.35
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.35
  • IBM Tivoli Directory Server 6.1.0.34
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.34
  • IBM Tivoli Directory Server 6.1.0.33
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.33
  • IBM Tivoli Directory Server 6.1.0.32
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.32
  • IBM Tivoli Directory Server 6.1.0.31
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.31
  • IBM Tivoli Directory Server 6.1.0.30
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.30
  • IBM Tivoli Directory Server 6.1.0.3
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.3
  • IBM Tivoli Directory Server 6.1.0.29
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.29
  • IBM Tivoli Directory Server 6.1.0.28
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.28
  • IBM Tivoli Directory Server 6.1.0.27
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.27
  • IBM Tivoli Directory Server 6.1.0.26
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.26
  • IBM Tivoli Directory Server 6.1.0.25
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.25
  • IBM Tivoli Directory Server 6.1.0.24
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.24
  • IBM Tivoli Directory Server 6.1.0.23
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.23
  • IBM Tivoli Directory Server 6.1.0.22
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.22
  • IBM Tivoli Directory Server 6.1.0.21
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.21
  • IBM Tivoli Directory Server 6.1.0.20
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.20
  • IBM Tivoli Directory Server 6.1.0.2
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.2
  • IBM Tivoli Directory Server 6.1.0.19
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.19
  • IBM Tivoli Directory Server 6.1.0.18
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.18
  • IBM Tivoli Directory Server 6.1.0.17
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.17
  • IBM Tivoli Directory Server 6.1.0.15
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.15
  • IBM Tivoli Directory Server 6.1.0.14
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.14
  • IBM Tivoli Directory Server 6.1.0.13
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.13
  • IBM Tivoli Directory Server 6.1.0.12
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.12
  • IBM Tivoli Directory Server 6.1.0.11
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.11
  • IBM Tivoli Directory Server 6.1.0.10
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.10
  • IBM Tivoli Directory Server 6.1.0.1
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.1
  • IBM Tivoli Directory Server 6.1.0.0
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.0
  • IBM Tivoli Directory Server 6.1.0
    cpe:2.3:a:ibm:tivoli_directory_server:6.1.0
  • IBM Tivoli Directory Server 6.2.0.0
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.0
  • IBM Tivoli Directory Server 6.2.0.1
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.1
  • IBM Tivoli Directory Server 6.2.0.10
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.10
  • IBM Tivoli Directory Server 6.2.0.11
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.11
  • IBM Tivoli Directory Server 6.2.0.12
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.12
  • IBM Tivoli Directory Server 6.2.0.13
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.13
  • IBM Tivoli Directory Server 6.2.0.14
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.14
  • IBM Tivoli Directory Server 6.2.0.15
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.15
  • IBM Tivoli Directory Server 6.2.0.19
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.19
  • IBM Tivoli Directory Server 6.2.0.2
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.2
  • IBM Tivoli Directory Server 6.2.0.20
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.20
  • IBM Tivoli Directory Server 6.2.0.21
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.21
  • IBM Tivoli Directory Server 6.2.0.22
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.22
  • IBM Tivoli Directory Server 6.2.0.23
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.23
  • IBM Tivoli Directory Server 6.2.0.24
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.24
  • IBM Tivoli Directory Server 6.2.0.25
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.25
  • IBM Tivoli Directory Server 6.2.0.26
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.26
  • IBM Tivoli Directory Server 6.2.0.27
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.27
  • IBM Tivoli Directory Server 6.2.0.29
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.29
  • IBM Tivoli Directory Server 6.2.0.30
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.30
  • IBM Tivoli Directory Server 6.2.0.31
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.31
  • IBM Tivoli Directory Server 6.2.0.32
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.32
  • IBM Tivoli Directory Server 6.2.0.33
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.33
  • IBM Tivoli Directory Server 6.2.0.34
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.34
  • IBM Tivoli Directory Server 6.2.0.35
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.35
  • IBM Tivoli Directory Server 6.2.0.36
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.36
  • IBM Tivoli Directory Server 6.2.0.37
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.37
  • IBM Tivoli Directory Server 6.2.0.39
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.39
  • IBM Tivoli Directory Server 6.2.0.38
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.38
  • IBM Tivoli Directory Server 6.2.0.40
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.40
  • IBM Tivoli Directory Server 6.2.0.41
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.41
  • IBM Tivoli Directory Server 6.2.0.42
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.42
  • IBM Tivoli Directory Server 6.2.0.3
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.3
  • IBM Tivoli Directory Server 6.2.0.4
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.4
  • IBM Tivoli Directory Server 6.2.0.5
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.5
  • IBM Tivoli Directory Server 6.2.0.6
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.6
  • IBM Tivoli Directory Server 6.2.0.7
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.7
  • IBM Tivoli Directory Server 6.2.0.8
    cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.8
  • IBM Tivoli Directory Server 6.3.0.0
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.0
  • IBM Tivoli Directory Server 6.3.0.1
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.1
  • IBM Tivoli Directory Server 6.3.0.10
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.10
  • IBM Tivoli Directory Server 6.3.0.11
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.11
  • IBM Tivoli Directory Server 6.3.0.12
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.12
  • IBM Tivoli Directory Server 6.3.0.14
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.14
  • IBM Tivoli Directory Server 6.3.0.15
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.15
  • IBM Tivoli Directory Server 6.3.0.17
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.17
  • IBM Tivoli Directory Server 6.3.0.18
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.18
  • IBM Tivoli Directory Server 6.3.0.19
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.19
  • IBM Tivoli Directory Server 6.3.0.21
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.21
  • IBM Tivoli Directory Server 6.3.0.22
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.22
  • IBM Tivoli Directory Server 6.3.0.23
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.23
  • IBM Tivoli Directory Server 6.3.0.24
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.24
  • IBM Tivoli Directory Server 6.3.0.25
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.25
  • IBM Tivoli Directory Server 6.3.0.26
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.26
  • IBM Tivoli Directory Server 6.3.0.27
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.27
  • IBM Tivoli Directory Server 6.3.0.28
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.28
  • IBM Tivoli Directory Server 6.3.0.29
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.29
  • IBM Tivoli Directory Server 6.3.0.30
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.30
  • IBM Tivoli Directory Server 6.3.0.31
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.31
  • IBM Tivoli Directory Server 6.3.0.32
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.32
  • IBM Tivoli Directory Server 6.3.0.33
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.33
  • IBM Tivoli Directory Server 6.3.0.34
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.34
  • IBM Tivoli Directory Server 6.3.0.35
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.35
  • IBM Tivoli Directory Server 6.3.0.2
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.2
  • IBM Tivoli Directory Server 6.3.0.8
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.8
  • IBM Tivoli Directory Server 6.3.0.9
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.9
  • IBM Tivoli Directory Server 6.3.1.0
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.0
  • IBM Tivoli Directory Server 6.3.1.5
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.5
  • IBM Tivoli Directory Server 6.3.1.6
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.6
  • IBM Tivoli Directory Server 6.3.1.7
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.7
  • IBM Tivoli Directory Server 6.3.1.8
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.8
  • IBM Tivoli Directory Server 6.3.1.9
    cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.9
CVSS
Base: 4.3 (as of 05-04-2016 - 14:29)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
nessus via4
  • NASL family AIX Local Security Checks
    NASL id AIX_JAVA_APRIL2015_ADVISORY.NASL
    description The version of Java SDK installed on the remote AIX host is affected by multiple vulnerabilities : - The Global Security Kit (GSKit) contains a flaw due to improper restrictions of TLS state transitions. A man-in-the-middle attacker can exploit this to downgrade the security of a session to use EXPORT_RSA ciphers. This allows the attacker to more easily break the encryption and monitor or tamper with the encrypted stream. (CVE-2015-0138) - An unspecified flaw exists that allows an attacker to execute code running under a security manager with elevated privileges.(CVE-2015-0192) - A security feature bypass vulnerability, known as FREAK (Factoring attack on RSA-EXPORT Keys), exists due to the support of weak EXPORT_RSA cipher suites with keys less than or equal to 512 bits. A man-in-the-middle attacker may be able to downgrade the SSL/TLS connection to use EXPORT_RSA cipher suites which can be factored in a short amount of time, allowing the attacker to intercept and decrypt the traffic. (CVE-2015-0204) - Multiple unspecified vulnerabilities exist in multiple Java subcomponents including 2D, Beans, Deployment, JCE, JSSE, and tools. (CVE-2015-0458, CVE-2015-0459, CVE-2015-0469, CVE-2015-0477, CVE-2015-0478, CVE-2015-0480, CVE-2015-0486, CVE-2015-0488, CVE-2015-0491) - An unspecified flaw exists that allows a remote attacker to bypass permission checks and gain access to sensitive information. (CVE-2015-1914) - An unspecified flaw exists due to the Socket Extension Provider's handling of TLS and SSL connections. A remote attacker can exploit this to cause a denial of service. (CVE-2015-1916) - A security feature bypass vulnerability exists, known as Bar Mitzvah, due to improper combination of state data with key data by the RC4 cipher algorithm during the initialization phase. A man-in-the-middle attacker can exploit this, via a brute-force attack using LSB values, to decrypt the traffic. (CVE-2015-2808)
    last seen 2019-02-21
    modified 2018-07-17
    plugin id 84087
    published 2015-06-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=84087
    title AIX Java Advisory : java_april2015_advisory.asc (Bar Mitzvah) (FREAK)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2015-1073-1.NASL
    description This update fixes the following security issues : - Version bump to 7.1-3.0 release bnc#930365 CVE-2015-0192 CVE-2015-2808 CVE-2015-1914 CVE-2015-0138 - Fix removeing links before update-alternatives run. bnc#931702 - Fix bnc#912434, javaws/plugin stuff should slave plugin update-alternatives - Fix bnc#912447, use system cacerts - Update to 7.1.2.10 for sec issues bnc#916266 and bnc#916265 CVE-2014-8892 CVE-2014-8891 Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-29
    plugin id 84260
    published 2015-06-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=84260
    title SUSE SLES12 Security Update : java-1_7_0-ibm (SUSE-SU-2015:1073-1) (Bar Mitzvah)
  • NASL family Web Servers
    NASL id WEBSPHERE_8_5_5_6.NASL
    description The IBM WebSphere Application Server running on the remote host is version 7.0 prior to 7.0.0.39, 8.0 prior to 8.0.0.11, or 8.5 prior to 8.5.5.6. It is, therefore, potentially affected by multiple vulnerabilities : - A security feature bypass vulnerability, known as FREAK (Factoring attack on RSA-EXPORT Keys), exists in the IBM Global Security Kit (GSKit) due to the support of weak EXPORT_RSA cipher suites with keys less than or equal to 512 bits. A man-in-the-middle attacker may be able to downgrade the SSL/TLS connection to use EXPORT_RSA cipher suites which can be factored in a short amount of time, allowing the attacker to intercept and decrypt the traffic. (CVE-2015-0138) - An information disclosure vulnerability exists due to a flaw in the Bleichenbacher countermeasure implementation in Apache WSS4J. A remote attacker can exploit this, via a crafted message, to determine where an encryption failure to place, allowing the attacker to gain access to the plaintext symmetric key. (CVE-2015-0226) - An XML External Entity (XXE) vulnerability exists due to an incorrectly configured XML parser that accepts XML external entities from an untrusted source. A remote attacker can exploit this, via specially crafted XML data, to gain access to arbitrary files. (CVE-2015-0250) - A privilege escalation vulnerability exists due to a flaw that occurs in 'full' profile and 'liberty' profile when using an OAuth grant password. A remote attacker can exploit this to gain elevated privileges. (CVE-2015-1885) - A privilege escalation vulnerability exists due to incorrect settings in the serveServletsbyClassname functionality. A remote attacker can exploit this to gain elevated privileges. (CVE-2015-1927) - An information disclosure vulnerability exists that allows an unauthenticated, remote attacker to identify the proxy server software by reading the HTTP 'Via' header. (CVE-2015-1932) - An unspecified flaw exists in the administrative console that allows a remote attacker, via the 'JSESSIONID' parameter, to hijack a user's session. (CVE-2015-1936) - A privilege escalation vulnerability exists due to an unspecified flaw that occurs when handling user roles. A local attacker can exploit this to gain elevated privileges. (CVE-2015-1946) - A security feature bypass vulnerability exists, known as Bar Mitzvah, due to improper combination of state data with key data by the RC4 cipher algorithm during the initialization phase. A man-in-the-middle attacker can exploit this, via a brute-force attack using LSB values, to decrypt the traffic. (CVE-2015-2808) - An unspecified flaw exists that allows an unauthenticated, remote attacker to spoof servlets or disclose sensitive information. (CVE-2015-4938)
    last seen 2019-02-21
    modified 2018-08-06
    plugin id 84639
    published 2015-07-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=84639
    title IBM WebSphere Application Server 7.0 < 7.0.0.39 (FP39) / 8.0 < 8.0.0.11 (FP11) / 8.5 < 8.5.5.6 (FP6) Multiple Vulnerabilities (Bar Mitzvah) (FREAK)
  • NASL family Databases
    NASL id DB2_101FP5.NASL
    description According to its version, the installation of IBM DB2 10.1 running on the remote host is prior to Fix Pack 5. It is, therefore, affected by multiple vulnerabilities : - An unspecified flaw exists in the monitoring or audit facility due to passwords being stored when handling specially crafted commands. A remote, authenticated attacker can exploit this to access sensitive information. (CVE-2014-0919) - A stack-based buffer overflow condition exists due to improper validation of user-supplied input when handling crafted ALTER MODULE statements. A remote, authenticated attacker can exploit this to cause a denial of service or execute arbitrary code. (CVE-2014-3094) - A flaw exists when handling a crafted UNION clause in a subquery of a SELECT statement. A remote, authenticated attacker can exploit this to cause a denial of service. (CVE-2014-3095) - A denial of service vulnerability exists when immediate AUTO_REVAL is enabled. A remote, authenticated attacker can exploit this, via a crafted ALTER TABLE statement, to crash the server. (CVE-2014-6159) - A denial of service vulnerability exists when handling an identity column within a crafted ALTER TABLE statement. A remote, authenticated attacker can exploit this vulnerability to crash the server. (CVE-2014-6209) - A denial of service vulnerability exists when handling multiple ALTER TABLE statements specifying the same column. A remote, authenticated attacker can exploit this vulnerability to crash the server. (CVE-2014-6210) - A flaw exists that is triggered when handling specially crafted XML queries. A remote, authenticated attacker can exploit this to cause a consumption of resources, resulting in a denial of service. (CVE-2014-8901) - An unspecified error exists during the handling of SELECT statements with XML/XSLT functions that allows a remote attacker to gain access to arbitrary files. (CVE-2014-8910) - A flaw exists in the IBM Global Security Kit (GSKit) when handling RSA temporary keys in a non-export RSA key exchange ciphersuite. A man-in-the-middle attacker can exploit this to downgrade the session security to use weaker EXPORT_RSA ciphers, thus allowing the attacker to more easily monitor or tamper with the encrypted stream. (CVE-2015-0138) - A flaw exists in the LUW component when handling SQL statements with unspecified Scaler functions. A remote, authenticated attacker can exploit this to cause a denial of service. (CVE-2015-0157) - An unspecified flaw in the General Parallel File System (GPFS) allows a local attacker to gain root privileges. (CVE-2015-0197) - A flaw exists in the General Parallel File System (GPFS), related to certain cipherList configurations, that allows a remote attacker, using specially crafted data, to bypass authentication and execute arbitrary programs with root privileges. (CVE-2015-0198) - A denial of service vulnerability exists in the General Parallel File System (GPFS) that allows a local attacker to corrupt kernel memory by sending crafted ioctl character device calls to the mmfslinux kernel module. (CVE-2015-0199) - An information disclosure vulnerability exists in the automated maintenance feature. An attacker with elevated privileges can exploit this issue by manipulating a stored procedure, resulting in the disclosure of arbitrary files owned by the DB2 fenced ID on UNIX/Linux or the administrator on Windows. (CVE-2015-1883) - A flaw exists in the Data Movement feature when handling specially crafted queries. An authenticated, remote attacker can exploit this to delete database rows from a table without having the appropriate privileges. (CVE-2015-1922) - An unspecified flaw exists when handling SQL statements with LUW Scaler functions. An authenticated, remote attacker can exploit this to run arbitrary code, under the privileges of the DB2 instance owner, or to cause a denial of service. (CVE-2015-1935) - A security feature bypass vulnerability exists, known as Bar Mitzvah, due to improper combination of state data with key data by the RC4 cipher algorithm during the initialization phase. A man-in-the-middle attacker can exploit this, via a brute-force attack using LSB values, to decrypt the traffic. (CVE-2015-2808) - A flaw exists when handling 'SUM' or 'GROUP BY' queries with a 'SUBSELECT' that contains 'unnest'. An authenticated, remote attacker can exploit this to cause a denial of service condition. - A use-after-free error exists in the CLI application due to improper validation of user-supplied input when handling client disconnects. An unauthenticated, remote attacker can exploit this to corrupt memory, resulting in a denial of service condition or the execution of arbitrary code. - A denial of service vulnerability exists due to an unspecified flaw in the sqldRemoveCachedTableEntry() function. An authenticated, remote attacker can exploit this to crash a DB2 instance. - An out-of-bounds write error exists due to improper validation of user-supplied input when handling the Partial Aggregation Operators (PED, PEA). A remote, authenticated attacker can exploit this to corrupt memory, resulting in a denial of service condition. - An integrity flaw exists due to insecure file permissions for the STMM log file. A local attacker can exploit this to manipulate the logs. - A denial of service vulnerability exists in the sqlex_find_group() function when returning a cumulative group name greater than 64K. An authenticated, remote attacker can exploit this to crash the server. - A flaw exists in the sqlsBinSortPopulateRecPointers() function due to improper validation of user-supplied input when performing resettable sorts. A remote, authenticated attacker can exploit this to corrupt memory, resulting in a denial of service. - A flaw exists that is triggered when handling 'INSERT INTO' statements. An authenticated, remote attacker can exploit this to crash DB2 when the target is a generated table created by a values clause containing multiple rows. - A flaw exists when invoking runstats against a user temporary table when the index clause explicitly specifies index names but omits the index schema name. An authenticated, remote attacker can exploit this to cause a denial of service. - A flaw exists in the DRDA communication protocol due to improper parsing of split DRDA messages under certain circumstances. An authenticated, remote attacker can exploit this to cause a large memory overwrite, resulting in a denial of service condition or the execution of arbitrary code. - An information disclosure vulnerability exists due to improper block cipher padding by TLSv1 when using Cipher Block Chaining (CBC) mode. A remote attacker, via an 'Oracle Padding' side channel attack, can exploit this vulnerability to gain access to sensitive information. Note that this is a variation of the POODLE attack. (NO CVE)
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 84826
    published 2015-07-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=84826
    title IBM DB2 10.1 < Fix Pack 5 Multiple Vulnerabilities (Bar Mitzvah)
  • NASL family Databases
    NASL id DB2_97FP10_MULTI_VULN.NASL
    description According to its version, the installation of IBM DB2 9.7 running on the remote host is prior to Fix Pack 11. It is, therefore, affected by multiple vulnerabilities : - An information disclosure vulnerability exists in the monitoring and audit features that occurs when handling a specially crafted command. An authenticated, remote attacker can exploit this to disclose sensitive information. (CVE-2014-0919) - A flaw exists that is triggered during the handling of a specially crafted ALTER TABLE statement on an identity column. An authenticated, remote attacker can exploit this to cause the server to terminate, resulting in a denial of service condition. (CVE-2014-6209) - A flaw exists that is triggered during the handling of multiple ALTER TABLE statements on the same column. An authenticated, remote attacker can exploit this to cause the server to terminate, resulting in a denial of service condition. (CVE-2014-6210) - A man-in-the-middle (MitM) information disclosure vulnerability, known as POODLE, exists due to the TLS server not verifying block cipher padding when using a cipher suite that employs a block cipher such as AES and DES. The lack of padding checking can allow encrypted TLS traffic to be decrypted. This vulnerability could allow for the decryption of HTTPS traffic by an unauthorized third party. (CVE-2014-8730) - A flaw exists that is triggered when handling a specially crafted XML query. An authenticated, remote attacker can exploit this to cause excessive consumption of CPU resources, resulting in a denial of service condition. (CVE-2014-8901) - An unspecified error exists during the handling of SELECT statements with XML/XSLT functions that allows a remote attacker to gain access to arbitrary files. (CVE-2014-8910) - A security feature bypass vulnerability, known as FREAK (Factoring attack on RSA-EXPORT Keys), exists in the IBM Global Security Kit (GSKit) due to the support of weak EXPORT_RSA cipher suites with keys less than or equal to 512 bits. A man-in-the-middle attacker may be able to downgrade the SSL/TLS connection to use EXPORT_RSA cipher suites which can be factored in a short amount of time, allowing the attacker to intercept and decrypt the traffic. (CVE-2015-0138) - A flaw exists in the LUW component when handling SQL statements with unspecified Scaler functions. A remote, authenticated attacker can exploit this to cause a denial of service. (CVE-2015-0157) - A denial of service vulnerability exists when processing an ECParameters structure due to an infinite loop that occurs when a specified curve is over a malformed binary polynomial field. A remote attacker can exploit this to perform a denial of service against any system that processes public keys, certificate requests, or certificates. This includes TLS clients and TLS servers with client authentication enabled. (CVE-2015-1788) - An information disclosure vulnerability exists in the automated maintenance feature. An attacker with elevated privileges, by manipulating a stored procedure, can exploit this issue to disclose arbitrary files owned by the DB2 fenced ID on UNIX/Linux or the administrator on Windows. (CVE-2015-1883) - A flaw exists in the Data Movement feature when handling specially crafted queries. An authenticated, remote attacker can exploit this to delete database rows from a table without having the appropriate privileges. (CVE-2015-1922) - A flaw exists when handling SQL statements having unspecified LUW Scaler functions. An authenticated, remote attacker can exploit this to run arbitrary code, under the privileges of the DB2 instance owner, or to cause a denial of service. (CVE-2015-1935) - A security feature bypass vulnerability exists, known as Bar Mitzvah, due to improper combination of state data with key data by the RC4 cipher algorithm during the initialization phase. A man-in-the-middle attacker can exploit this, via a brute-force attack using LSB values, to decrypt the traffic. (CVE-2015-2808) - A denial of service vulnerability exists in the query compiler QGM due to improper handling of duplicate reloc entry queries. An authenticated, remote attacker can exploit this to crash the database. - A denial of service vulnerability exists in the SQLEX_FIND_GROUP() function due to improper handling of group name results. An authenticated, remote attacker can exploit this to crash the database. - A denial of service vulnerability exists in the query compiler QGM due to improper handling of DBCLOB column types. An authenticated, remote attacker can exploit this to crash the database. - A denial of service vulnerability exists in the Relational Data Services component in the SQLRA_GET_SECT_INFO_BY_CURSOR_NAME() function due to improper handling of stored procedures. An authenticated, remote attacker can exploit this to crash the database.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 84828
    published 2015-07-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=84828
    title IBM DB2 9.7 < Fix Pack 11 Multiple Vulnerabilities (Bar Mitzvah) (FREAK) (TLS POODLE)
  • NASL family Databases
    NASL id DB2_105FP6.NASL
    description According to its version, the installation of IBM DB2 10.5 running on the remote host is prior to Fix Pack 6. It is, therefore, affected by the following vulnerabilities : - A flaw exists in the IBM Global Security Kit (GSKit) when handling RSA temporary keys in a non-export RSA key exchange ciphersuite. A man-in-the-middle attacker can exploit this to downgrade the session security to use weaker EXPORT_RSA ciphers, thus allowing the attacker to more easily monitor or tamper with the encrypted stream. (CVE-2015-0138) - An unspecified flaw in the General Parallel File System (GPFS) allows a local attacker to gain root privileges. (CVE-2015-0197) - A flaw exists in the General Parallel File System (GPFS), related to certain cipherList configurations, that allows a remote attacker, using specially crafted data, to bypass authentication and execute arbitrary programs with root privileges. (CVE-2015-0198) - A denial of service vulnerability exists in the General Parallel File System (GPFS) that allows a local attacker to corrupt kernel memory by sending crafted ioctl character device calls to the mmfslinux kernel module. (CVE-2015-0199) - An information disclosure vulnerability exists in the automated maintenance feature. An attacker with elevated privileges can exploit this issue by manipulating a stored procedure, resulting in the disclosure of arbitrary files owned by the DB2 fenced ID on UNIX/Linux or the administrator on Windows. (CVE-2015-1883) - A flaw exists in the Data Movement feature when handling specially crafted queries. An authenticated, remote attacker can exploit this to delete database rows from a table without having the appropriate privileges. (CVE-2015-1922) - An unspecified flaw exists when handling SQL statements with LUW Scaler functions. An authenticated, remote attacker can exploit this to run arbitrary code, under the privileges of the DB2 instance owner, or to cause a denial of service. (CVE-2015-1935) - A security feature bypass vulnerability exists, known as Bar Mitzvah, due to improper combination of state data with key data by the RC4 cipher algorithm during the initialization phase. A man-in-the-middle attacker can exploit this, via a brute-force attack using LSB values, to decrypt the traffic. (CVE-2015-2808) - An information disclosure vulnerability exists due to improper block cipher padding by TLSv1 when using Cipher Block Chaining (CBC) mode. A remote attacker, via an 'Oracle Padding' side channel attack, can exploit this vulnerability to gain access to sensitive information. Note that this is a variation of the POODLE attack. (NO CVE)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 86002
    published 2015-09-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=86002
    title IBM DB2 10.5 < Fix Pack 6 Multiple Vulnerabilities (Bar Mitzvah)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2015-1085-1.NASL
    description IBM Java 1.5.0 was updated to SR16-FP10 fixing security issues and bugs. Tabulated information can be found on: http://www.ibm.com/developerworks/java/jdk/alerts/#IB M_Security_Update_May_2015 CVE-2015-0192 CVE-2015-2808 CVE-2015-1914 CVE-2015-0138 CVE-2015-0491 CVE-2015-0459 CVE-2015-0469 CVE-2015-0480 CVE-2015-0488 CVE-2015-0478 CVE-2015-0477 CVE-2015-0204 Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-29
    plugin id 84285
    published 2015-06-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=84285
    title SUSE SLES10 Security Update : IBM Java (SUSE-SU-2015:1085-1) (Bar Mitzvah) (FREAK)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2015-1086-3.NASL
    description IBM Java 1.7.0 was updated to SR9 fixing security issues and bugs. Tabulated information can be found on: http://www.ibm.com/developerworks/java/jdk/alerts/#IB M_Security_Update_May_2015 CVE-2015-0192 CVE-2015-2808 CVE-2015-1914 CVE-2015-0138 CVE-2015-0491 CVE-2015-0458 CVE-2015-0459 CVE-2015-0469 CVE-2015-0480 CVE-2015-0488 CVE-2015-0478 CVE-2015-0477 CVE-2015-0204 Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-29
    plugin id 84423
    published 2015-06-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=84423
    title SUSE SLES11 Security Update : Java (SUSE-SU-2015:1086-3) (Bar Mitzvah) (FREAK)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2015-1086-2.NASL
    description IBM Java 1.6.0 was updated to SR16-FP4 fixing security issues and bugs. Tabulated information can be found on: http://www.ibm.com/developerworks/java/jdk/alerts/#IB M_Security_Update_May_2015 CVE-2015-0192 CVE-2015-2808 CVE-2015-1914 CVE-2015-0138 CVE-2015-0491 CVE-2015-0458 CVE-2015-0459 CVE-2015-0469 CVE-2015-0480 CVE-2015-0488 CVE-2015-0478 CVE-2015-0477 CVE-2015-0204 Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-29
    plugin id 84337
    published 2015-06-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=84337
    title SUSE SLES11 Security Update : IBM Java (SUSE-SU-2015:1086-2) (Bar Mitzvah) (FREAK)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2015-1021.NASL
    description Updated java-1.5.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6 Supplementary. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. IBM J2SE version 5.0 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security alerts page, listed in the References section. (CVE-2005-1080, CVE-2015-0138, CVE-2015-0192, CVE-2015-0459, CVE-2015-0469, CVE-2015-0477, CVE-2015-0478, CVE-2015-0480, CVE-2015-0488, CVE-2015-0491, CVE-2015-1914, CVE-2015-2808) The CVE-2015-0478 issue was discovered by Florian Weimer of Red Hat Product Security. Note: With this update, the IBM JDK now disables RC4 SSL/TLS cipher suites by default to address the CVE-2015-2808 issue. Refer to Red Hat Bugzilla bug 1207101, linked to in the References section, for additional details about this change. IBM Java SDK and JRE 5.0 will not receive software updates after September 2015. This date is referred to as the End of Service (EOS) date. Customers are advised to migrate to current versions of IBM Java at this time. IBM Java SDK and JRE versions 6 and 7 are available via the Red Hat Enterprise Linux 5 and 6 Supplementary content sets and will continue to receive updates based on IBM's lifecycle policy, linked to in the References section. Customers can also consider OpenJDK, an open source implementation of the Java SE specification. OpenJDK is available by default on supported hardware architectures. All users of java-1.5.0-ibm are advised to upgrade to these updated packages, containing the IBM J2SE 5.0 SR16-FP10 release. All running instances of IBM Java must be restarted for this update to take effect.
    last seen 2019-02-21
    modified 2018-12-27
    plugin id 83754
    published 2015-05-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83754
    title RHEL 5 / 6 : java-1.5.0-ibm (RHSA-2015:1021) (Bar Mitzvah)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2015-1020.NASL
    description Updated java-1.7.1-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 6 and 7 Supplementary. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security alerts page, listed in the References section. (CVE-2005-1080, CVE-2015-0138, CVE-2015-0192, CVE-2015-0458, CVE-2015-0459, CVE-2015-0469, CVE-2015-0477, CVE-2015-0478, CVE-2015-0480, CVE-2015-0488, CVE-2015-0491, CVE-2015-1914, CVE-2015-2808) The CVE-2015-0478 issue was discovered by Florian Weimer of Red Hat Product Security. Note: With this update, the IBM JDK now disables RC4 SSL/TLS cipher suites by default to address the CVE-2015-2808 issue. Refer to Red Hat Bugzilla bug 1207101, linked to in the References section, for additional details about this change. All users of java-1.7.1-ibm are advised to upgrade to these updated packages, containing the IBM Java SE 7R1 SR3 release. All running instances of IBM Java must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-12-20
    plugin id 83753
    published 2015-05-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83753
    title RHEL 6 / 7 : java-1.7.1-ibm (RHSA-2015:1020) (Bar Mitzvah)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2015-1086-4.NASL
    description IBM Java 1.7.0 was updated to SR9 fixing security issues and bugs. Tabulated information can be found on: http://www.ibm.com/developerworks/java/jdk/alerts/#IB M_Security_Update_May_2015. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-29
    plugin id 84441
    published 2015-06-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=84441
    title SUSE SLES11 Security Update : java-1_7_0-ibm (SUSE-SU-2015:1086-4) (Bar Mitzvah) (FREAK)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2015-1007.NASL
    description Updated java-1.7.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 5 Supplementary. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. IBM Java SE version 7 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security alerts page, listed in the References section. (CVE-2005-1080, CVE-2015-0138, CVE-2015-0192, CVE-2015-0458, CVE-2015-0459, CVE-2015-0469, CVE-2015-0477, CVE-2015-0478, CVE-2015-0480, CVE-2015-0488, CVE-2015-0491, CVE-2015-1914, CVE-2015-2808) The CVE-2015-0478 issue was discovered by Florian Weimer of Red Hat Product Security. Note: With this update, the IBM JDK now disables RC4 SSL/TLS cipher suites by default to address the CVE-2015-2808 issue. Refer to Red Hat Bugzilla bug 1207101, linked to from the References section, for additional details about this change. All users of java-1.7.0-ibm are advised to upgrade to these updated packages, containing the IBM Java SE 7 SR9 release. All running instances of IBM Java must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 83433
    published 2015-05-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83433
    title RHEL 5 : java-1.7.0-ibm (RHSA-2015:1007) (Bar Mitzvah)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2015-1091.NASL
    description Updated java-1.6.0-ibm packages that fix several security issues are now available for Red Hat Satellite 5.6 and 5.7. Red Hat Product Security has rated this update as having Low security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update corrects several security vulnerabilities in the IBM Java Runtime Environment shipped as part of Red Hat Satellite 5. In a typical operating environment, these are of low security risk as the runtime is not used on untrusted applets. Further information about these flaws can be found on the IBM Java Security alerts page, listed in the References section. (CVE-2005-1080, CVE-2015-0138, CVE-2015-0192, CVE-2015-0458, CVE-2015-0459, CVE-2015-0469, CVE-2015-0477, CVE-2015-0478, CVE-2015-0480, CVE-2015-0488, CVE-2015-0491, CVE-2015-1914, CVE-2015-2808) The CVE-2015-0478 issue was discovered by Florian Weimer of Red Hat Product Security. Note: With this update, the IBM JDK now disables RC4 SSL/TLS cipher suites by default to address the CVE-2015-2808 issue. Refer to Red Hat Bugzilla bug 1207101, linked to from the References section, for additional details about this change. Users of Red Hat Satellite 5.6 and 5.7 are advised to upgrade to these updated packages, which contain the IBM Java SE 6 SR16-FP4 release. For this update to take effect, Red Hat Satellite must be restarted ('/usr/sbin/rhn-satellite restart'), as well as all running instances of IBM Java.
    last seen 2019-02-21
    modified 2018-12-27
    plugin id 84143
    published 2015-06-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=84143
    title RHEL 5 / 6 : Red Hat Satellite IBM Java Runtime (RHSA-2015:1091) (Bar Mitzvah)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2015-1138-1.NASL
    description IBM Java 1.6.0 was updated to SR16-FP4 fixing security issues and bugs. Tabulated information can be found on: http://www.ibm.com/developerworks/java/jdk/alerts/#IB M_Security_Update_May_2015 CVE-2015-0192 CVE-2015-2808 CVE-2015-1914 CVE-2015-0138 CVE-2015-0491 CVE-2015-0458 CVE-2015-0459 CVE-2015-0469 CVE-2015-0480 CVE-2015-0488 CVE-2015-0478 CVE-2015-0477 CVE-2015-0204 Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-29
    plugin id 84425
    published 2015-06-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=84425
    title SUSE SLES10 Security Update : IBM Java (SUSE-SU-2015:1138-1) (Bar Mitzvah) (FREAK)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2015-1161-1.NASL
    description IBM Java 1.6.0 was updated to SR16-FP4 fixing security issues and bugs. Tabulated information can be found on: [http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Updat e_May _2015](http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security _Upda te_May_2015) CVEs addressed: CVE-2015-0192 CVE-2015-2808 CVE-2015-1914 CVE-2015-0138 CVE-2015-0491 CVE-2015-0458 CVE-2015-0459 CVE-2015-0469 CVE-2015-0480 CVE-2015-0488 CVE-2015-0478 CVE-2015-0477 CVE-2015-0204 Additional bugs fixed : - Fix javaws/plugin stuff should slave plugin update-alternatives (bnc#912434) - Changed Java to use the system root CA certificates (bnc#912447) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 119967
    published 2019-01-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119967
    title SUSE SLES12 Security Update : java-1_6_0-ibm (SUSE-SU-2015:1161-1) (Bar Mitzvah) (FREAK)
  • NASL family AIX Local Security Checks
    NASL id AIX_JAVA_APR2015_ADVISORY.NASL
    description The version of Java SDK installed on the remote host is affected by multiple vulnerabilities : - A man-in-the-middle information disclosure vulnerability exists due to a TLS security downgrade flaw. A man-in-the-middle attacker may be able to downgrade the SSL/TLS connection to use EXPORT_RSA cipher suites which can be factored in a short amount of time, allowing the attacker to intercept and decrypt the traffic. (CVE-2015-0138) - A flaw exists in the RC4 algorithm implementation due to improper combination of state data with key data during the initialization phase. A man-in-the-middle attacker can exploit this to conduct plaintext-recovery attacks. (CVE-2015-2808)
    last seen 2019-02-21
    modified 2018-07-17
    plugin id 83135
    published 2015-04-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83135
    title AIX Java Advisory : Multiple Vulnerabilities (Bar Mitzvah)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2015-1006.NASL
    description Updated java-1.6.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6 Supplementary. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security alerts page, listed in the References section. (CVE-2005-1080, CVE-2015-0138, CVE-2015-0192, CVE-2015-0458, CVE-2015-0459, CVE-2015-0469, CVE-2015-0477, CVE-2015-0478, CVE-2015-0480, CVE-2015-0488, CVE-2015-0491, CVE-2015-1914, CVE-2015-2808) The CVE-2015-0478 issue was discovered by Florian Weimer of Red Hat Product Security. Note: With this update, the IBM JDK now disables RC4 SSL/TLS cipher suites by default to address the CVE-2015-2808 issue. Refer to Red Hat Bugzilla bug 1207101, linked to from the References section, for additional details about this change. All users of java-1.6.0-ibm are advised to upgrade to these updated packages, containing the IBM Java SE 6 SR16-FP4 release. All running instances of IBM Java must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-12-27
    plugin id 83432
    published 2015-05-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83432
    title RHEL 5 / 6 : java-1.6.0-ibm (RHSA-2015:1006) (Bar Mitzvah)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2015-1086-1.NASL
    description IBM Java 1.6.0 was updated to SR16-FP4 fixing security issues and bugs. Tabulated information can be found on: http://www.ibm.com/developerworks/java/jdk/alerts/#IB M_Security_Update_May_2015 CVE-2015-0192 CVE-2015-2808 CVE-2015-1914 CVE-2015-0138 CVE-2015-0491 CVE-2015-0458 CVE-2015-0459 CVE-2015-0469 CVE-2015-0480 CVE-2015-0488 CVE-2015-0478 CVE-2015-0477 CVE-2015-0204 Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-29
    plugin id 84286
    published 2015-06-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=84286
    title SUSE SLES11 Security Update : IBM Java (SUSE-SU-2015:1086-1) (Bar Mitzvah) (FREAK)
redhat via4
advisories
  • rhsa
    id RHSA-2015:1006
  • rhsa
    id RHSA-2015:1007
  • rhsa
    id RHSA-2015:1020
  • rhsa
    id RHSA-2015:1021
  • rhsa
    id RHSA-2015:1091
refmap via4
bid 73326
confirm
suse
  • SUSE-SU-2015:1073
  • SUSE-SU-2015:1085
  • SUSE-SU-2015:1086
  • SUSE-SU-2015:1138
  • SUSE-SU-2015:1161
Last major update 02-01-2017 - 21:59
Published 24-03-2015 - 21:59
Back to Top