Vulnerability Name:

CVE-2016-6309 (CCN-117148)

Assigned:2016-09-26
Published:2016-09-26
Updated:2018-07-12
Summary:statem/statem.c in OpenSSL 1.1.0a does not consider memory-block movement after a realloc call, which allows remote attackers to cause a denial of service (use-after-free) or possibly execute arbitrary code via a crafted TLS session.
CVSS v3 Severity:9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-416
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2016-6309

Source: CONFIRM
Type: UNKNOWN
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759

Source: CONFIRM
Type: UNKNOWN
http://www-01.ibm.com/support/docview.wss?uid=swg21995039

Source: CCN
Type: IBM Security Bulletin T1024507 (Flex System Manager Node)
Multiple vulnerabilities in OpenSSL affect IBM Flex System Manager (FSM) Storage Manager Install Anywhere (SMIA) configuration tool

Source: CCN
Type: IBM Security Bulletin S1010571 (Cisco MDS 9710 Multilayer Director)
OpenSSL Security Advisory [22 Sep 2016] and [26 Sep 2016] affects IBM Cisco SAN switches and directors.

Source: CCN
Type: IBM Security Bulletin S1010578 (SAN512B-6 Director (8961-F08))
IBM b-type SAN switches and directors affected by OpenSSL Security Advisory [22 Sep 2016] and [26 Sep 2016].

Source: CCN
Type: IBM Security Bulletin 1990532 (Tivoli Network Manager IP Edition)
Vulnerabilities in OpenSSL affect IBM Tivoli Network Manager IP Edition 3.9 Fix Pack 4 - HTTPS support for Perl Collector

Source: CCN
Type: IBM Security Bulletin 1993061 (Sterling Connect:Express for UNIX)
Multiple Vulnerabilities in OpenSSL affect IBM Sterling Connect:Express for Unix

Source: CCN
Type: IBM Security Bulletin 1994499 (PureApplication System)
Multiple vulnerabilities in OpenSSL affect IBM PureApplication System.

Source: CCN
Type: IBM Security Bulletin 1995039 (Security Virtual Server Protection for VMware)
Vulnerabilities in OpenSSL, OpenVPN and GNU glibc affect IBM Security Virtual Server Protection for VMware

Source: CCN
Type: IBM Security Bulletin 1995129 (Spectrum Control Standard Edition)
Multiple Security Vulnerabilities in OpenSSL affect IBM Spectrum Control (formerly Tivoli Storage Productivity Center)

Source: CCN
Type: IBM Security Bulletin 1995392 (Rational Reporting for Development Intelligence)
Vulnerabilities in OpenSSL affect Rational Reporting for Development Intelligence

Source: CCN
Type: IBM Security Bulletin 1995393 (Rational Insight)
Vulnerabilities in OpenSSL affect Rational Insight

Source: CCN
Type: IBM Security Bulletin 1995691 (Cognos Business Intelligence)
IBM Cognos Business Intelligence Server 2016Q4 Security Updater : IBM Cognos Business Intelligence Server is affected by multiple vulnerabilities.

Source: CCN
Type: IBM Security Bulletin 1996032 (Tivoli Common Reporting)
IBM Tivoli Common Reporting (TCR) 2016Q4 Security Updater : TCR is affected by multiple vulnerabilities.

Source: CCN
Type: IBM Security Bulletin 1996096 (Workload Scheduler)
Multiple vulnerabilities in OpenSSL affect IBM Workload Scheduler

Source: CCN
Type: IBM Security Bulletin 1996180 (Security Network Active Bypass)
Vulnerabilities in OpenSSL affect IBM Security Network Active Bypass (CVE-2016-6304, CVE-2016-6303, CVE-2016-2181, CVE-2016-6309, CVE-2016-7052 )

Source: CCN
Type: IBM Security Bulletin 1996181 (Security Network Controller)
Vulnerabilities in OpenSSL affect IBM Security Network Controller (CVE-2016-6304, CVE-2016-6303, CVE-2016-6308, CVE-2016-2181, CVE-2016-6309, CVE-2016-7052 )

Source: CCN
Type: IBM Security Bulletin 1996275 (InfoSphere Master Data Management)
Multiple vulnerabilities in OpenSSL affects IBM InfoSphere Master Data Management

Source: CCN
Type: IBM Security Bulletin 1997063 (PureApplication System)
Multiple vulnerabilities in OpenSSL affect IBM Image Construction and Composition Tool.

Source: CCN
Type: IBM Security Bulletin 2000095 (Cognos Analytics)
IBM Cognos Analytics is affected by multiple vulnerabilities

Source: CCN
Type: IBM Security Bulletin 2000209 (Tivoli Storage FlashCopy Manager)
Vulnerabilities in OpenSSL affect Tivoli Storage FlashCopy Manager Unix (CVE-2016-6303, CVE-2016-2182, CVE-2016-2177, CVE-2016-2183, CVE-2016-6309, CVE-2016-7052, CVE-2016-2178, CVE-2016-6306)

Source: CCN
Type: IBM Security Bulletin 2000589 (Tivoli Storage FlashCopy Manager)
Vulnerabilities in OpenSSL affect Tivoli Storage FlashCopy Manager VMware (CVE-2016-6303, CVE-2016-2182, CVE-2016-2177, CVE-2016-2183, CVE-2016-6309, CVE-2016-7052, CVE-2016-2178, CVE-2016-6306)

Source: CCN
Type: IBM Security Bulletin 2000740 (Cognos Controller)
Multiple vulnerabilities have been identified in IBM Cognos Controller

Source: CCN
Type: IBM Security Bulletin 2003620 (Spectrum Protect for Virtual Environments)
Multiple Vulnerabilities in OpenSSL affect IBM Spectrum Protect (formerly Tivoli Storage Manager) Client and IBM Spectrum Protect (formerly Tivoli Storage Manager) for Virtual Environments: Data Protection for VMware

Source: CCN
Type: IBM Security Bulletin 2014126 (Contact Optimization)
Multiple Vulnerabilities in OpenSSL Affect IBM Campaign, IBM Contact Optimization

Source: CCN
Type: IBM Security Bulletin C1000213 (MobileFirst Platform Foundation)
Multiple Vulnerabilities in OpenSSL affect IBM Worklight and IBM MobileFirst Platform Foundation

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html

Source: CCN
Type: Oracle CPUJan2017
Oracle Critical Patch Update Advisory - January 2017

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

Source: BID
Type: UNKNOWN
93177

Source: CCN
Type: BID-93177
OpenSSL CVE-2016-6309 Remote Code Execution Vulnerability

Source: SECTRACK
Type: UNKNOWN
1036885

Source: CONFIRM
Type: UNKNOWN
https://bto.bluecoat.com/security-advisory/sa132

Source: XF
Type: UNKNOWN
openssl-cve20166309-dos(117148)

Source: CONFIRM
Type: Issue Tracking
https://git.openssl.org/?p=openssl.git;a=commit;h=acacbfa7565c78d2273c0b2a2e5e803f44afefeb

Source: CONFIRM
Type: UNKNOWN
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us

Source: CCN
Type: Cisco Security Advisory cisco-sa-20160927-openssl
Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016

Source: CCN
Type: OpenSSL Security Advisory [26 Sep 2016]
OpenSSL Security Advisory [26 Sep 2016]

Source: CONFIRM
Type: Vendor Advisory
https://www.openssl.org/news/secadv/20160926.txt

Source: CONFIRM
Type: UNKNOWN
https://www.tenable.com/security/tns-2016-16

Source: CONFIRM
Type: UNKNOWN
https://www.tenable.com/security/tns-2016-20

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2016-6309

Vulnerable Configuration:Configuration 1:
  • cpe:/a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*
  • AND
  • cpe:/a:cisco:unified_meetingplace:-:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_master_data_management:10.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_master_data_management:10.0:*:*:*:collaborative:*:*:*
  • OR cpe:/a:ibm:cognos_business_intelligence:10.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_intelligence:10.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_virtual_server_protection:1.1.0.1:*:*:*:*:vmware:*:*
  • OR cpe:/a:cisco:webex_meetings_server:-:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_master_data_management:11.0:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:jabber:-:-:*:*:*:windows:*:*
  • OR cpe:/a:cisco:socialminer:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:anyconnect_secure_mobility_client:-:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_intelligence:10.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_storage_flashcopy_manager:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_storage_flashcopy_manager:3.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_storage_flashcopy_manager:4.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_reporting:2.0:*:*:*:development_intelligence:*:*:*
  • OR cpe:/a:ibm:rational_reporting:2.0.1:*:*:*:development_intelligence:*:*:*
  • OR cpe:/a:ibm:rational_reporting:2.0.3:*:*:*:development_intelligence:*:*:*
  • OR cpe:/a:ibm:rational_reporting:2.0.4:*:*:*:development_intelligence:*:*:*
  • OR cpe:/a:ibm:rational_reporting:2.0.5:*:*:*:development_intelligence:*:*:*
  • OR cpe:/a:ibm:rational_reporting:2.0.6:*:*:*:development_intelligence:*:*:*
  • OR cpe:/a:ibm:security_virtual_server_protection:1.1.1.0:*:*:*:*:vmware:*:*
  • OR cpe:/a:ibm:infosphere_master_data_management:11.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_master_data_management:11.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_network_manager:3.9:*:ip:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_connect:express:1.5:*:*:*:unix:*:*:*
  • OR cpe:/a:ibm:rational_reporting:5.0:*:*:*:development_intelligence:*:*:*
  • OR cpe:/a:ibm:rational_reporting:5.0.1:*:*:*:development_intelligence:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_intelligence:10.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_common_reporting:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_common_reporting:3.1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_common_reporting:3.1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:2.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:2.1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_reporting:5.0.2:*:*:*:development_intelligence:*:*:*
  • OR cpe:/a:ibm:workload_scheduler:8.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:workload_scheduler:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:workload_scheduler:9.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_controller:10.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_controller:10.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_controller:10.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_controller:10.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:2.1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:workload_scheduler:9.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mobilefirst_platform_foundation:6.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mobilefirst_platform_foundation:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_common_reporting:3.1.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:2.1.0.2:*:*:*:*:*:*:*
  • OR cpe:/h:ibm:flex_system_manager_node:*:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:2.1.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_protect_for_virtual_environments:7.1:*:*:*:*:hyper-v:*:*
  • OR cpe:/a:ibm:tivoli_common_reporting:3.1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:2.1.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mobilefirst_platform_foundation:7.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_analytics:11:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_master_data_management:11.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:2.1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:webex_node_for_mcs:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:jabber_software_development_kit:8.6(1):*:*:*:*:*:*:*
  • OR cpe:/a:cisco:jabber:-:*:*:*:*:android:*:*
  • OR cpe:/a:ibm:pureapplication_system:2.2.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:jabber:-:*:*:*:*:mac:*:*
  • OR cpe:/a:ibm:pureapplication_system:2.1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mobilefirst_platform_foundation:6.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mobilefirst_platform_foundation:6.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:2.2.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:2.1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_common_reporting:3.1.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_control:5.2.10:*:standard:*:*:*:*:*
  • OR cpe:/a:cisco:jabber_guest:-:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mobilefirst_platform_foundation:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_master_data_management:11.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:2.2.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:2.2.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:2.1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_analytics:11.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_protect:8.1:*:*:*:virtual_environments:*:*:*
  • OR cpe:/a:ibm:contact_optimization:9.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:contact_optimization:9.1.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.cisecurity:def:1930
    V
    Vulnerability in statem/statem.c in OpenSSL 1.1.0a - CVE-2016-6309
    2017-03-03
    oval:com.ubuntu.precise:def:20166309000
    V
    CVE-2016-6309 on Ubuntu 12.04 LTS (precise) - high.
    2016-09-26
    oval:com.ubuntu.xenial:def:201663090000000
    V
    CVE-2016-6309 on Ubuntu 16.04 LTS (xenial) - high.
    2016-09-26
    oval:com.ubuntu.trusty:def:20166309000
    V
    CVE-2016-6309 on Ubuntu 14.04 LTS (trusty) - high.
    2016-09-26
    oval:com.ubuntu.xenial:def:20166309000
    V
    CVE-2016-6309 on Ubuntu 16.04 LTS (xenial) - high.
    2016-09-26
    BACK
    openssl openssl 1.1.0a
    openssl openssl 1.1.0a
    cisco unified meetingplace -
    ibm infosphere master data management 10.1
    ibm infosphere master data management 10.0
    ibm cognos business intelligence 10.1.1
    ibm cognos business intelligence 10.2
    ibm security virtual server protection 1.1.0.1
    cisco webex meetings server -
    ibm rational insight 1.1
    ibm rational insight 1.1.1
    ibm rational insight 1.1.1.1
    ibm infosphere master data management 11.0
    cisco jabber - -
    cisco socialminer -
    cisco anyconnect secure mobility client -
    ibm cognos business intelligence 10.2.1
    ibm tivoli storage flashcopy manager 3.1
    ibm tivoli storage flashcopy manager 3.2
    ibm tivoli storage flashcopy manager 4.1
    ibm rational reporting 2.0
    ibm rational reporting 2.0.1
    ibm rational reporting 2.0.3
    ibm rational reporting 2.0.4
    ibm rational reporting 2.0.5
    ibm rational reporting 2.0.6
    ibm security virtual server protection 1.1.1.0
    ibm infosphere master data management 11.3
    ibm infosphere master data management 11.4
    ibm tivoli network manager 3.9
    ibm sterling connect:express 1.5
    ibm rational reporting 5.0
    ibm rational reporting 5.0.1
    ibm rational insight 1.1.1.4
    ibm rational insight 1.1.1.5
    ibm rational insight 1.1.1.2
    ibm rational insight 1.1.1.3
    ibm pureapplication system 2.0
    ibm cognos business intelligence 10.2.2
    ibm tivoli common reporting 3.1
    ibm tivoli common reporting 3.1.0.1
    ibm tivoli common reporting 3.1.0.2
    ibm pureapplication system 2.0.0.1
    ibm rational insight 1.1.1.6
    ibm pureapplication system 2.1.0.0
    ibm rational reporting 5.0.2
    ibm workload scheduler 8.6
    ibm workload scheduler 9.1
    ibm workload scheduler 9.2
    ibm cognos controller 10.2.1
    ibm cognos controller 10.1
    ibm cognos controller 10.1.1
    ibm cognos controller 10.2.0
    ibm pureapplication system 2.1.0.1
    ibm rational insight 1.1.1.7
    ibm workload scheduler 9.3
    ibm mobilefirst platform foundation 6.3
    ibm mobilefirst platform foundation 7.0
    ibm tivoli common reporting 3.1.2.0
    ibm pureapplication system 2.1.0.2
    ibm flex system manager node *
    ibm pureapplication system 2.1.1.0
    ibm spectrum protect for virtual environments 7.1
    ibm tivoli common reporting 3.1.2.1
    ibm pureapplication system 2.1.2.0
    ibm mobilefirst platform foundation 7.1
    ibm cognos analytics 11
    ibm infosphere master data management 11.5
    ibm pureapplication system 2.1.2.1
    cisco webex node for mcs -
    cisco jabber software development kit 8.6(1)
    cisco jabber -
    ibm pureapplication system 2.2.0.0
    cisco jabber -
    ibm pureapplication system 2.1.2.2
    ibm mobilefirst platform foundation 6.1
    ibm mobilefirst platform foundation 6.2
    ibm pureapplication system 2.2.1.0
    ibm pureapplication system 2.1.2.3
    ibm tivoli common reporting 3.1.3.0
    ibm spectrum control 5.2.10
    cisco jabber guest -
    ibm mobilefirst platform foundation 8.0
    ibm infosphere master data management 11.6
    ibm pureapplication system 2.2.2.0
    ibm pureapplication system 2.2.2.1
    ibm pureapplication system 2.1.2.4
    ibm cognos analytics 11.0
    ibm spectrum protect 8.1
    ibm contact optimization 9.1.1
    ibm contact optimization 9.1.2