Bug 1219223 (CVE-2015-0138)

Summary: CVE-2015-0138 IBM JDK: ephemeral RSA keys accepted for non-export SSL/TLS cipher suites (FREAK)
Product: [Other] Security Response Reporter: Tomas Hoger <thoger>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: dbhole, jvanek
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-05-20 20:39:27 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1209063    

Description Tomas Hoger 2015-05-06 21:00:20 UTC
IBM JDK versions 5.0 SR16-FP10, 6 SR16-FP4, 6R1 SR8-FP4, 7 SR9, 7R1 SR3 and 8 SR1 correct an issue known as "FREAK" (Factoring RSA Export Keys).  An SSL/TLS client using IBM JDK's JSSE can accept ephemeral RSA keys even when using non-export cipher suites.  A MITM attacker could possibly use this flaw to impersonate server which enables export cipher suites.  This issue is similar to CVE-2015-0204 (bug 1180184) which affected OpenSSL.

Description of the flaw in the IBM security bulletin:

A vulnerability in various IBM SSL/TLS implementations could allow a remote attacker to downgrade the security of certain SSL/TLS connections. An IBM SSL/TLS client implementation could accept the use of an RSA temporary key in a non-export RSA key exchange ciphersuite. This could allow a remote attacker using man-in-the-middle techniques to facilitate brute-force decryption of TLS/SSL traffic between vulnerable clients and servers. This vulnerability is also known as the FREAK attack.

References:

http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_May_2015
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
https://www.smacktls.com/#freak

Comment 1 Tomas Hoger 2015-05-07 12:32:40 UTC
In addition to fixing the bug that causes client to accept ephemeral RSA keys for non-export cipher suites, these updates also disable export cipher suites by default in IBM JDK 5.0 and 6.  They were previously disabled in IBM JDK 7.

Comment 2 errata-xmlrpc 2015-05-13 13:34:05 UTC
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 5

Via RHSA-2015:1007 https://rhn.redhat.com/errata/RHSA-2015-1007.html

Comment 3 errata-xmlrpc 2015-05-13 13:36:00 UTC
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 6
  Supplementary for Red Hat Enterprise Linux 5

Via RHSA-2015:1006 https://rhn.redhat.com/errata/RHSA-2015-1006.html

Comment 4 errata-xmlrpc 2015-05-20 18:37:11 UTC
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 5
  Supplementary for Red Hat Enterprise Linux 6

Via RHSA-2015:1021 https://rhn.redhat.com/errata/RHSA-2015-1021.html

Comment 5 errata-xmlrpc 2015-05-20 19:06:46 UTC
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 6
  Supplementary for Red Hat Enterprise Linux 7

Via RHSA-2015:1020 https://rhn.redhat.com/errata/RHSA-2015-1020.html

Comment 6 errata-xmlrpc 2015-06-11 13:22:17 UTC
This issue has been addressed in the following products:

  Red Hat Satellite Server v 5.6
  Red Hat Satellite Server v 5.7

Via RHSA-2015:1091 https://rhn.redhat.com/errata/RHSA-2015-1091.html