Bug 1588882 (CVE-2016-10684)

Summary: CVE-2016-10684 healthcenter: downloads binary resources over HTTP
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: abergmann, bkearney, ggainey, meissner, psampaio, tlestach
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2018-06-11 12:50:53 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1588883    

Description Pedro Sampaio 2018-06-08 01:57:03 UTC
healthcenter - IBM Monitoring and Diagnostic Tools health Center agent healthcenter downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.

External references:

https://nodesecurity.io/advisories/288

Comment 4 Tomas Hoger 2018-06-11 12:50:53 UTC
This CVE seems to be specific to how the healthcenter NPM package installer downloads binaries from the IBM download site using http rather than https.  It does not seem relevant to the healthcenter component included in IBM JDKs.