First published: Mon Mar 26 2018(Updated: )
The Remote Client and change management integrations in IBM Rational ClearCase 7.1.x, 8.0.0.x before 8.0.0.18, and 8.0.1.x before 8.0.1.11 do not properly validate hostnames in X.509 certificates from SSL servers, which allows remote attackers to spoof servers and obtain sensitive information or modify network traffic via a crafted certificate. IBM X-Force ID: 106715.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Rational ClearCase | >=7.1<=7.1.2.16 | |
IBM Rational ClearCase | >8.0<=8.0.0.17 | |
IBM Rational ClearCase | >=8.0.1<=8.0.1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5039 is classified as a moderate severity vulnerability due to potential exploitation by remote attackers.
To fix CVE-2015-5039, upgrade IBM Rational ClearCase to version 8.0.0.18 or 8.0.1.11 or later.
IBM Rational ClearCase versions 7.1.x, 8.0.0.x before 8.0.0.18, and 8.0.1.x before 8.0.1.11 are affected by CVE-2015-5039.
CVE-2015-5039 allows remote attackers to spoof SSL servers and potentially access sensitive information.
The main issue of CVE-2015-5039 is the improper validation of hostnames in X.509 certificates.