Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2015.1683 Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects IBM Cognos Command Center (CVE-2015-4000) and Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects IBM Cognos Controller (CVE-2015-4000) 29 June 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM Cognos Command Center IBM Cognos Controller Publisher: IBM Operating System: Windows Impact/Access: Access Privileged Data -- Remote/Unauthenticated Provide Misleading Information -- Remote/Unauthenticated Resolution: Mitigation CVE Names: CVE-2015-4000 Reference: ESB-2015.1673 ESB-2015.1671 ESB-2015.1670 ESB-2015.1669 ESB-2015.1663 ESB-2015.1655 ESB-2015.1640 ESB-2015.1623 ESB-2015.1614 Original Bulletin: http://www-01.ibm.com/support/docview.wss?uid=swg21960508 http://www-01.ibm.com/support/docview.wss?uid=swg21960454 Comment: This bulletin contains two (2) IBM security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects IBM Cognos Command Center (CVE-2015-4000) Document information More support for: Cognos Command Center Software version: 10.1, 10.2, 10.2.1, 10.2.2 Operating system(s): Windows Reference #: 1960508 Modified date: 2015-06-27 Security Bulletin Summary The Logjam Attack on TLS connections using the Diffie-Hellman (DH) key exchange protocol affects IBM Cognos Command Center. Vulnerability Details CVEID: CVE-2015-4000 DESCRIPTION: The TLS protocol could allow a remote attacker to obtain sensitive information, caused by the failure to properly convey a DHE_EXPORT ciphersuite choice. An attacker could exploit this vulnerability using man-in-the-middle techniques to force a downgrade to 512-bit export-grade cipher. Successful exploitation could allow an attacker to recover the session key as well as modify the contents of the traffic. This vulnerability is commonly referred to as "Logjam". CVSS Base Score: 4.3 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/103294 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N) Affected Products and Versions IBM Cognos Command Center 10.2.2 IBM Cognos Command Center 10.2.1 IBM Cognos Command Center 10.2 IBM Cognos Command Center 10.1 Remediation/Fixes The recommended solution is to apply the IBM JRE 6.0 SR16FP5 to the following versions of IBM Cognos Command Center: IBM Cognos Command Center 10.2.2 IBM Cognos Command Center 10.2.1 IBM Cognos Command Center 10.2 IBM Cognos Command Center 10.1 The fix for all affected versions is found here: http://www.ibm.com/support/fixcentral/swg/quickorder?parent=Cognos&product=ibm/Information+Management/Cognos+Command+Center&release=10.2.2&platform=Windows+32-bit,+x86&function=fixId&fixids=10.2.2-BA-CCC-Win32-JRE-60SR16FP5 Installation instructions for applying this fix. For Microsoft Windows servers where the Agent or Server component is installed. 1. Download the 32 bit IBM Java JRE (file name: ibm-java-jre-60-win-i386.zip, Size: 75 MB). 2. Stop the CccServer, CccQueue and CccAgent Microsoft Windows services. 3. For IBM Cognos Command Center 10.1 and 10.2: Rename the <INSTALLDIR>\Common\java directory to <INSTALLDIR>\Common\java.orig 4. For IBM Cognos Command Center 10.2.1: Rename the <INSTALLDIR>\Common\java.6.0.16.0 directory to <INSTALLDIR>\Common\java.6.0.16.0.orig 5. For IBM Cognos Command Center 10.2.2: Rename the <INSTALLDIR>\Common\java.6.0.16 directory to <INSTALLDIR>\Common\java.6.0.16.orig 6. For IBM Cognos Command Center 10.1 and 10.2: Unpack the content of the ibm-java-jre-60-win-i386.zip file to <INSTALLDIR>\Common\java 7. For IBM Cognos Command Center 10.2.1: Unpack the content of the ibm-java-jre-60-win-i386.zip file to <INSTALLDIR>\Common\java.6.0.16.0 8. For IBM Cognos Command Center 10.2.2: Unpack the content of the ibm-java-jre-60-win-i386.zip file to <INSTALLDIR>\Common\java.6.0.16 9. Start the CccAgent, CccQueue and CccServer Microsoft Windows services. 10.Validate the installation by testing the connectivity to the agent using the CCC Client. For Microsoft Windows servers where the Server or Web Client component is installed apply these additional steps. 1. Follow the instructions described in the Microsoft Security Bulletin MS15-055 titled "Vulnerability in Schannel Could Allow Information Disclosure (3061518)". (https://technet.microsoft.com/en-us/library/security/ms15-055.aspx) For IBM Cognos Command Center with above fix applied: Before upgrading your installation to 10.2.2 please revert to the original \java\ or \java.6.0.16.0\ directory: 1. Stop the CccServer, CccQueue and CccAgent Windows services. 2. Rename the <INSTALLDIR>\Common\java (or \java.6.0.16.0) directory to <INSTALLDIR>\Common\java.cve (or \java.6.0.16.0.cve) 3. Rename the <INSTALLDIR>\Common\java.orig (or java.6.0.16.0.orig) directory to <INSTALLDIR>\Common\java (or java.6.0.16.0). 4. Proceed to upgrade your Cognos Command Center installation to a newer version. 5. After upgrade to newer version is done, please reapply "Vulnerability in Diffie-Hellman ciphers affects IBM Cognos Command Center (CVE-2015-4000)" fix starting Step 1. You should verify applying this configuration change does not cause any compatibility issues. If you change the default setting after applying the fix, you will expose yourself to the attack described above. IBM recommends that you review your entire environment to identify other areas where you have enabled the Diffie-Hellman key-exchange protocol used in TLS and take appropriate mitigation and remediation actions. Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. References Complete CVSS Guide On-line Calculator V2 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Acknowledgement Reported to IBM by The WeakDH team at https://weakdh.org Change History 26 June 2015 Original Version Published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - ---------------------------------------------------------------------------- Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects IBM Cognos Controller (CVE-2015-4000) Document information More support for: Cognos Controller Software version: 8.5, 8.5.1, 10.1, 10.1.1, 10.2.0, 10.2.1 Operating system(s): Windows Reference #: 1960454 Modified date: 2015-06-26 Security Bulletin Summary The Logjam Attack on TLS connections using the Diffie-Hellman (DH) key exchange protocol affects IBM Cognos Controller Vulnerability Details CVEID: CVE-2015-4000 DESCRIPTION: The TLS protocol could allow a remote attacker to obtain sensitive information, caused by the failure to properly convey a DHE_EXPORT ciphersuite choice. An attacker could exploit this vulnerability using man-in-the-middle techniques to force a downgrade to 512-bit export-grade cipher. Successful exploitation could allow an attacker to recover the session key as well as modify the contents of the traffic. This vulnerability is commonly referred to as "Logjam". CVSS Base Score: 4.3 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/103294 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N) Affected Products and Versions IBM Cognos Controller 10.2.1 IBM Cognos Controller 10.2 IBM Cognos Controller 10.1.1 IBM Cognos Controller 10.1 IBM Cognos Controller 8.5.1 IBM Cognos Controller 8.5 Remediation/Fixes None Workarounds and Mitigations The DH cipher suites must be disabled using Cognos Configuration by performing the following actions: 1) Start Cognos Configuration. 2) Navigate to Security/Cryptography/Cognos 3) Open the supported cipher suites selection dialog. 4) Select all cipher suites that have DH in the the name and remove them from the Current Values List. Select OK to save the new list. 5) Save and restart your service using Cognos Configuration. You should verify applying this configuration change does not cause any compatibility issues. Not disabling the DH stream cipher will expose yourself to the attack described above. IBM recommends that you review your entire environment to identify other areas where you have enabled the DH stream cipher and take appropriate mitigation and remediation actions. Get Notified about Future Security Bulletins Subscribe to My Notifications to be notified of important product support alerts like this. References Complete CVSS Guide On-line Calculator V2 Related information IBM Secure Engineering Web Portal IBM Product Security Incident Response Blog Acknowledgement Reported to IBM by The WeakDH team at https://weakdh.org Change History Original version published: June 26, 2015 *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVZC79X6ZAP0PgtI9AQLuDA//f/UWvEmj2ExyINovn+RURLZrgkbQvLmg QXMktsg0i1r/Ds2I+tbFGPGdkLxBbCb5JYLmx7oL6fvOcdNpmp3tMG+FvNQGNDc5 Y2rGUOVUYbAh0PLa5tHv0QeXxGt02BY20wOL+cU5WOpCg08Ca86EftNgh2k4lqwH /0QgqLpZj2zro/s6O8yhXXRLLZnoCtpVbp+tsp0so0szWkQ4OWRC2vIG2wMVmahV pnuLRz0GHpM4gW5Gbj9n6md4a/g+y1ZweuietQIomMfDsTbgK9IbFz08qLhgJ2+3 IVWd2qNInEvkzTP30LooELGdpYs5Z13VtMDgz0+QNcIlt9XqPxgtikgQ/rw7fB6+ pXEecpf+Or24uTMdUZ/ioUhttPDLDZPy8rrkrh2WWHXiPH66ULwereNy2T0+Vf37 D/z361mX2OrvCfj/Uxidfjia/tthVmq7EuzEeOh3bDbb3QLHKE/WWtLp7RGQX0LB lYK+U4anr/dTuSftti0cOxgIev8xIn4ek472VY+4ak9XsBOCykyqSL3ZgRBYk+Zy cMUXptzs/88CL4bbO+ZhL+M4esvQ7plfXPhTXck3vBjFSglG2A0OJCCTwdcBPEcn It/2E22eWSjeTdY05xwTfCtiTSxoLnMLL33I2ae3He89J5aud7F2OShPC3HyAxf9 xmAr/xy8Z6c= =FLG8 -----END PGP SIGNATURE-----