Security Bulletin: IBM Sterling Connect:Express for UNIX is affected by multiple vulnerabilities in OpenSSL

Flash (Alert)


Abstract

A number of security vulnerabilities have been discovered in the OpenSSL libraries included in IBM Sterling Connect:Express for UNIX.

Content

VULNERABILITY DETAILS:

CVE ID
: CVE-2013-0169 CVE-2013-0166 CVE-2012-2686 CVE-2012-2131 CVE-2012-2110 CVE-2012-0884 CVE-2012-0050 CVE-2011-4108 CVE-2011-4576 CVE-2011-4577 CVE-2011-4619 CVE-2012-0027 CVE-2011-3207 CVE-2011-3210 CVE-2011-0014 CVE-2010-4252 CVE-2010-3864 CVE-2010-0742 CVE-2010-1633

DESCRIPTION: IBM Sterling Connect:Express for UNIX uses OpenSSL libraries for cryptography, and a number of security vulnerabilities have been discovered in the OpenSSL libraries.

AFFECTED VERSIONS:

IBM Sterling Connect:Express for UNIX 1.4.6.

IBM Sterling Connect:Express for UNIX 1.5.0.

REMEDIATION:

The recommended solution is to apply the fix for each version as soon as practical. See below for information on the available fixes.
· Version 1.5.0: apply Fix Pack 1.5.08.
· Version 1.4.6: apply Fix Pack 1.4.64.

WORKAROUND(S):
• None known. Apply fix.

MITIGATION(S):
• None known

REFERENCES:
· Complete CVSS Guide
· On-line Calculator V2
· CVE-2013-0169
·RELATED INFORMATION:
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog


*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.

Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY

Related information

A Japanese translation is available

Document information


More support for:

Sterling Connect:Express for UNIX

Software version:

1.4, 1.5

Operating system(s):

AIX, HP-UX, Linux, Solaris

Reference #:

1633107

Modified date:

2015-11-04

Translate my page

Content navigation