First published: Thu Aug 09 2018(Updated: )
IBM Rational ClearQuest 8.0 through 8.0.1.9 and 9.0 through 9.0.1.3 (CQ OSLC linkages, EmailRelay) fails to check the SSL certificate against the requested hostname. It is subject to a man-in-the-middle attack with an impersonating server observing all the data transmitted to the real server. IBM X-Force ID: 113353.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Rational ClearQuest | >=8.0.0.0<=8.0.0.21 | |
IBM Rational ClearQuest | >=8.0.1.0<=8.0.1.17 | |
IBM Rational ClearQuest | >=9.0.0.0<=9.0.0.6 | |
IBM Rational ClearQuest | >=9.0.1.0<=9.0.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2922 has a high severity rating due to its potential for man-in-the-middle attacks.
To mitigate CVE-2016-2922, upgrade IBM Rational ClearQuest to a patched version that checks the SSL certificate against the requested hostname.
CVE-2016-2922 affects IBM Rational ClearQuest versions 8.0 through 8.0.1.9 and 9.0 through 9.0.1.3.
CVE-2016-2922 enables man-in-the-middle attacks where an attacker can intercept data transmitted to a server.
CVE-2016-2922 involves the CQ OSLC linkages and EmailRelay components of IBM Rational ClearQuest.