IBM Rational ClearQuest 7.1.1.x / 7.1.2.x < / 8.0.0.x < / 8.0.1.x < OpenSSL Library Multiple Vulnerabilities (credentialed check) (Heartbleed)

medium Nessus Plugin ID 81782
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote host has software installed that is affected by multiple vulnerabilities.


The remote host has a version of IBM Rational ClearQuest 7.1.1.x / 7.1.2.x prior to / 8.0.0.x prior to / 8.0.1.x prior to installed. It is, therefore, potentially affected by multiple vulnerabilities in the OpenSSL library :

- An error exists related to the implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA) that allows nonce disclosure via the 'FLUSH+RELOAD' cache side-channel attack. (CVE-2014-0076)

- An out-of-bounds read error, known as the 'Heartbleed Bug', exists related to handling TLS heartbeat extensions that allows an attacker to obtain sensitive information such as primary key material, secondary key material, and other protected content. Note that this error only affects versions of ClearQuest later than 7.1.2. (CVE-2014-0160)


Upgrade to IBM Rational ClearQuest Interim Fix 01 ( / Interim Fix 01 ( / Interim Fix 01 ( or later.

See Also

Plugin Details

Severity: Medium

ID: 81782

File Name: ibm_rational_clearquest_8_0_1_3_01.nasl

Version: 1.8

Type: local

Agent: windows

Family: Windows

Published: 3/12/2015

Updated: 11/22/2019

Dependencies: ibm_rational_clearquest_installed.nasl

Configuration: Enable paranoid mode

Risk Information

CVSS Score Source: CVE-2014-0160


Risk Factor: High

Score: 7.5


Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:ibm:rational_clearquest

Required KB Items: installed_sw/IBM Rational ClearQuest, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/22/2014

Vulnerability Publication Date: 2/24/2014

Exploitable With

Core Impact

Reference Information

CVE: CVE-2014-0076, CVE-2014-0160

BID: 66363, 66690

CERT: 720951

EDB-ID: 32745, 32764, 32791, 32998