Vulnerability Name:

CVE-2014-6221 (CCN-98929)

Assigned:2014-09-02
Published:2015-03-18
Updated:2016-11-28
Summary:The MSCAPI/MSCNG interface implementation in GSKit in IBM Rational ClearCase 7.1.2.x before 7.1.2.17, 8.0.0.x before 8.0.0.14, and 8.0.1.x before 8.0.1.7 does not properly generate random numbers, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.
CVSS v3 Severity:9.1 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): None
CVSS v2 Severity:9.4 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:N)
7.0 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): None
8.8 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:N)
6.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): None
Vulnerability Type:CWE-310
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2014-6221

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21698893

Source: CCN
Type: IBM Security Bulletin 1699055
Vulnerabilities in GSKit affect IBM WebSphere MQ (CVE-2015-0159, CVE-2015-0138 and CVE-2014-6221)

Source: CCN
Type: IBM Security Bulletin 1699543
Vulnerabilities in GSKit affect IBM DB2 (CVE-2015-0138, CVE-2015-0159 and CVE-2014-6221)

Source: CCN
Type: IBM Security Bulletin 1961719
IBM PureData System for Operational Analytics V1.0 (A1791) is affected by vulnerabilities in GSKit (CVE-2015-0138, CVE-2015-0159 and CVE-2014-6221)

Source: BID
Type: UNKNOWN
73915

Source: CCN
Type: BID-73915
Multiple IBM Products GSKit CVE-2014-6221 Random Data Generation Security Weakness

Source: SECTRACK
Type: UNKNOWN
1032026

Source: XF
Type: UNKNOWN
ibm-gskit-cve20146221-info-disc(98929)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ibm:rational_clearcase:7.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.9:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.10:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.11:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.12:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.13:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.14:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.15:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.16:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.1.6:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    ibm rational clearcase 7.1.2
    ibm rational clearcase 7.1.2.1
    ibm rational clearcase 7.1.2.2
    ibm rational clearcase 7.1.2.3
    ibm rational clearcase 7.1.2.4
    ibm rational clearcase 7.1.2.5
    ibm rational clearcase 7.1.2.6
    ibm rational clearcase 7.1.2.7
    ibm rational clearcase 7.1.2.9
    ibm rational clearcase 7.1.2.10
    ibm rational clearcase 7.1.2.11
    ibm rational clearcase 7.1.2.12
    ibm rational clearcase 7.1.2.13
    ibm rational clearcase 7.1.2.14
    ibm rational clearcase 7.1.2.15
    ibm rational clearcase 7.1.2.16
    ibm rational clearcase 8.0.0
    ibm rational clearcase 8.0.0.1
    ibm rational clearcase 8.0.0.2
    ibm rational clearcase 8.0.0.3
    ibm rational clearcase 8.0.0.4
    ibm rational clearcase 8.0.0.5
    ibm rational clearcase 8.0.0.6
    ibm rational clearcase 8.0.0.7
    ibm rational clearcase 8.0.0.8
    ibm rational clearcase 8.0.0.9
    ibm rational clearcase 8.0.0.10
    ibm rational clearcase 8.0.0.11
    ibm rational clearcase 8.0.0.12
    ibm rational clearcase 8.0.0.13
    ibm rational clearcase 8.0.1
    ibm rational clearcase 8.0.1.1
    ibm rational clearcase 8.0.1.2
    ibm rational clearcase 8.0.1.3
    ibm rational clearcase 8.0.1.4
    ibm rational clearcase 8.0.1.5
    ibm rational clearcase 8.0.1.6